Analysis
-
max time kernel
60s -
max time network
64s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 11:55
Static task
static1
Behavioral task
behavioral1
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
General
-
Target
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
-
Size
5.2MB
-
MD5
9e12e3e503674039878cb7542a30f33c
-
SHA1
789b75006358e62cff26877e4fc5fdd31f7e8a76
-
SHA256
714b89115f9f4b3979e2f70ad6eb9e7d81fbcd8a8c984d7271adf01c8ecbcd36
-
SHA512
0091f4b40a06cadb0e12f1066dcb2c79a0ffa60bcc873761751e3f7feb85e30a38ba29cbbb29f3f32fa810236055044978533186942c07d0070e64b3e4dac544
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
XMRig Miner Payload 3 IoCs
resource yara_rule behavioral1/memory/2336-145-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/2336-144-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/2336-160-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 10 IoCs
pid Process 3180 keygen-pr.exe 3092 keygen-step-1.exe 3124 keygen-step-3.exe 656 keygen-step-4.exe 1288 key.exe 1400 Setup.exe 2420 multitimer.exe 2848 setups.exe 3672 askinstall20.exe 3852 setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 3852 setups.tmp 3852 setups.tmp 3852 setups.tmp 3852 setups.tmp 3852 setups.tmp 3852 setups.tmp 3852 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 149 ipinfo.io 153 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 3952 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2248 PING.EXE 5872 PING.EXE 5356 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 150 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 155 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3852 setups.tmp 3852 setups.tmp -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1400 Setup.exe Token: SeCreateTokenPrivilege 3672 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 3672 askinstall20.exe Token: SeLockMemoryPrivilege 3672 askinstall20.exe Token: SeIncreaseQuotaPrivilege 3672 askinstall20.exe Token: SeMachineAccountPrivilege 3672 askinstall20.exe Token: SeTcbPrivilege 3672 askinstall20.exe Token: SeSecurityPrivilege 3672 askinstall20.exe Token: SeTakeOwnershipPrivilege 3672 askinstall20.exe Token: SeLoadDriverPrivilege 3672 askinstall20.exe Token: SeSystemProfilePrivilege 3672 askinstall20.exe Token: SeSystemtimePrivilege 3672 askinstall20.exe Token: SeProfSingleProcessPrivilege 3672 askinstall20.exe Token: SeIncBasePriorityPrivilege 3672 askinstall20.exe Token: SeCreatePagefilePrivilege 3672 askinstall20.exe Token: SeCreatePermanentPrivilege 3672 askinstall20.exe Token: SeBackupPrivilege 3672 askinstall20.exe Token: SeRestorePrivilege 3672 askinstall20.exe Token: SeShutdownPrivilege 3672 askinstall20.exe Token: SeDebugPrivilege 3672 askinstall20.exe Token: SeAuditPrivilege 3672 askinstall20.exe Token: SeSystemEnvironmentPrivilege 3672 askinstall20.exe Token: SeChangeNotifyPrivilege 3672 askinstall20.exe Token: SeRemoteShutdownPrivilege 3672 askinstall20.exe Token: SeUndockPrivilege 3672 askinstall20.exe Token: SeSyncAgentPrivilege 3672 askinstall20.exe Token: SeEnableDelegationPrivilege 3672 askinstall20.exe Token: SeManageVolumePrivilege 3672 askinstall20.exe Token: SeImpersonatePrivilege 3672 askinstall20.exe Token: SeCreateGlobalPrivilege 3672 askinstall20.exe Token: 31 3672 askinstall20.exe Token: 32 3672 askinstall20.exe Token: 33 3672 askinstall20.exe Token: 34 3672 askinstall20.exe Token: 35 3672 askinstall20.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 setups.exe 3852 setups.tmp -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4704 wrote to memory of 480 4704 Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe 77 PID 4704 wrote to memory of 480 4704 Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe 77 PID 4704 wrote to memory of 480 4704 Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe 77 PID 480 wrote to memory of 3180 480 cmd.exe 80 PID 480 wrote to memory of 3180 480 cmd.exe 80 PID 480 wrote to memory of 3180 480 cmd.exe 80 PID 480 wrote to memory of 3092 480 cmd.exe 81 PID 480 wrote to memory of 3092 480 cmd.exe 81 PID 480 wrote to memory of 3092 480 cmd.exe 81 PID 480 wrote to memory of 3124 480 cmd.exe 82 PID 480 wrote to memory of 3124 480 cmd.exe 82 PID 480 wrote to memory of 3124 480 cmd.exe 82 PID 480 wrote to memory of 656 480 cmd.exe 83 PID 480 wrote to memory of 656 480 cmd.exe 83 PID 480 wrote to memory of 656 480 cmd.exe 83 PID 3180 wrote to memory of 1288 3180 keygen-pr.exe 85 PID 3180 wrote to memory of 1288 3180 keygen-pr.exe 85 PID 3180 wrote to memory of 1288 3180 keygen-pr.exe 85 PID 656 wrote to memory of 1400 656 keygen-step-4.exe 86 PID 656 wrote to memory of 1400 656 keygen-step-4.exe 86 PID 3124 wrote to memory of 1820 3124 keygen-step-3.exe 87 PID 3124 wrote to memory of 1820 3124 keygen-step-3.exe 87 PID 3124 wrote to memory of 1820 3124 keygen-step-3.exe 87 PID 1820 wrote to memory of 2248 1820 cmd.exe 90 PID 1820 wrote to memory of 2248 1820 cmd.exe 90 PID 1820 wrote to memory of 2248 1820 cmd.exe 90 PID 1288 wrote to memory of 2252 1288 key.exe 89 PID 1288 wrote to memory of 2252 1288 key.exe 89 PID 1288 wrote to memory of 2252 1288 key.exe 89 PID 1400 wrote to memory of 2420 1400 Setup.exe 91 PID 1400 wrote to memory of 2420 1400 Setup.exe 91 PID 1400 wrote to memory of 2848 1400 Setup.exe 92 PID 1400 wrote to memory of 2848 1400 Setup.exe 92 PID 1400 wrote to memory of 2848 1400 Setup.exe 92 PID 656 wrote to memory of 3672 656 keygen-step-4.exe 93 PID 656 wrote to memory of 3672 656 keygen-step-4.exe 93 PID 656 wrote to memory of 3672 656 keygen-step-4.exe 93 PID 2848 wrote to memory of 3852 2848 setups.exe 94 PID 2848 wrote to memory of 3852 2848 setups.exe 94 PID 2848 wrote to memory of 3852 2848 setups.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe"C:\Users\Admin\AppData\Local\Temp\Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\YRCS7SWG4U\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\YRCS7SWG4U\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\YRCS7SWG4U\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\YRCS7SWG4U\multitimer.exe" 1 3.1617537374.6069a95e71d0f 1016⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\YRCS7SWG4U\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\YRCS7SWG4U\multitimer.exe" 2 3.1617537374.6069a95e71d0f7⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\bozfhsszjyu\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\bozfhsszjyu\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\is-DF0TB.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-DF0TB.tmp\IBInstaller_97039.tmp" /SL5="$30290,14574507,721408,C:\Users\Admin\AppData\Local\Temp\bozfhsszjyu\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5140
-
-
-
C:\Users\Admin\AppData\Local\Temp\pa4nuji1nzb\vict.exe"C:\Users\Admin\AppData\Local\Temp\pa4nuji1nzb\vict.exe" /VERYSILENT /id=5358⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\is-9DB5D.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-9DB5D.tmp\vict.tmp" /SL5="$301A0,870426,780800,C:\Users\Admin\AppData\Local\Temp\pa4nuji1nzb\vict.exe" /VERYSILENT /id=5359⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\is-KL9CA.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-KL9CA.tmp\win1host.exe" 53510⤵PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fwp4hbo3w0y\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\fwp4hbo3w0y\cpyrix.exe" /VERYSILENT8⤵PID:3936
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:4580
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:1912
-
-
-
C:\Users\Admin\AppData\Local\Temp\qd1g24tg5at\rxhvjcakepq.exe"C:\Users\Admin\AppData\Local\Temp\qd1g24tg5at\rxhvjcakepq.exe" /ustwo INSTALL8⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\z0yfngllwhe\vpn.exe"C:\Users\Admin\AppData\Local\Temp\z0yfngllwhe\vpn.exe" /silent /subid=4828⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\is-UMK0H.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-UMK0H.tmp\vpn.tmp" /SL5="$501A4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\z0yfngllwhe\vpn.exe" /silent /subid=4829⤵PID:5396
-
-
-
C:\Users\Admin\AppData\Local\Temp\ijxxnlri32i\fgrvrehfudg.exe"C:\Users\Admin\AppData\Local\Temp\ijxxnlri32i\fgrvrehfudg.exe" /VERYSILENT8⤵PID:5280
-
-
C:\Users\Admin\AppData\Local\Temp\gdkaqojjzg1\dkibihuhcgd.exe"C:\Users\Admin\AppData\Local\Temp\gdkaqojjzg1\dkibihuhcgd.exe"8⤵PID:5164
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\gdkaqojjzg1\dkibihuhcgd.exe"9⤵PID:6012
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ly2rvemjlsh\krdrwyypyn2.exe"C:\Users\Admin\AppData\Local\Temp\ly2rvemjlsh\krdrwyypyn2.exe" /quiet SILENT=1 AF=7568⤵PID:5596
-
-
C:\Users\Admin\AppData\Local\Temp\nyxninhpkmy\app.exe"C:\Users\Admin\AppData\Local\Temp\nyxninhpkmy\app.exe" /8-238⤵PID:5152
-
-
C:\Users\Admin\AppData\Local\Temp\qnvmkufhlhx\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\qnvmkufhlhx\Setup3310.exe" /Verysilent /subid=5778⤵PID:4380
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CRCMNTY4CQ\setups.exe"C:\Users\Admin\AppData\Local\Temp\CRCMNTY4CQ\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\is-NARDQ.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-NARDQ.tmp\setups.tmp" /SL5="$7007A,454998,229376,C:\Users\Admin\AppData\Local\Temp\CRCMNTY4CQ\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:2488
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"4⤵PID:3328
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:416
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:1012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:1896
-
C:\Users\Admin\AppData\Roaming\9272.tmp.exe"C:\Users\Admin\AppData\Roaming\9272.tmp.exe"5⤵PID:2600
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4820
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:2336
-
-
-
C:\Users\Admin\AppData\Roaming\93EA.tmp.exe"C:\Users\Admin\AppData\Roaming\93EA.tmp.exe"5⤵PID:2420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5476
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5608
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4968
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3276
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4488
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\is-615KV.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-615KV.tmp\Setup3310.tmp" /SL5="$30306,138429,56832,C:\Users\Admin\AppData\Local\Temp\qnvmkufhlhx\Setup3310.exe" /Verysilent /subid=5771⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\is-5V5TC.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-5V5TC.tmp\Setup.exe" /Verysilent2⤵PID:1828
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:1376
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:2428
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:4220
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\is-800QE.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-800QE.tmp\LabPicV3.tmp" /SL5="$30458,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:5148
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\is-4KP1K.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-4KP1K.tmp\lylal220.tmp" /SL5="$20336,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:5428
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:6132
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5444
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:2524
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:2112
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"3⤵PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LFTKK.tmp\fgrvrehfudg.tmp"C:\Users\Admin\AppData\Local\Temp\is-LFTKK.tmp\fgrvrehfudg.tmp" /SL5="$3028A,2592217,780800,C:\Users\Admin\AppData\Local\Temp\ijxxnlri32i\fgrvrehfudg.exe" /VERYSILENT1⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\is-7O0GU.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-7O0GU.tmp\winlthsth.exe"2⤵PID:5592
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-4CEIG.tmp\{app}\microsoft.cab -F:* %ProgramData%1⤵PID:5620
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-4CEIG.tmp\{app}\microsoft.cab -F:* C:\ProgramData2⤵PID:5880
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5232
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AAE7338D69A878A837DD4A5AF0A759C6 C2⤵PID:1908
-