Analysis
-
max time kernel
60s -
max time network
62s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 18:22
Static task
static1
Behavioral task
behavioral1
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
General
-
Target
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
-
Size
5.2MB
-
MD5
c9d0760f5504d9e8ce237543fc4e7562
-
SHA1
12dac9b23d9f95b9647767e15a265a73380ad50b
-
SHA256
2519f6e84956fd35aaf7aa0ac51c2ce4cd8fddc973933936560ddb1efff6a16f
-
SHA512
28e06d8763858601484ec3675b5d0895712b616d69b36d4c584f32dfb56dfe9a7c26ad05dfda27efc2e9512c11d7dedcafd4d69d98baffdda8eb5af9ba99398a
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 5 IoCs
pid Process 3372 keygen-pr.exe 3352 keygen-step-1.exe 4012 keygen-step-3.exe 2812 keygen-step-4.exe 1332 key.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 128 ipinfo.io 131 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 4252 taskkill.exe 7064 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2308 PING.EXE 4844 PING.EXE 5972 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 129 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 150 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3976 wrote to memory of 3156 3976 Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe 79 PID 3976 wrote to memory of 3156 3976 Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe 79 PID 3976 wrote to memory of 3156 3976 Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe 79 PID 3156 wrote to memory of 3372 3156 cmd.exe 82 PID 3156 wrote to memory of 3372 3156 cmd.exe 82 PID 3156 wrote to memory of 3372 3156 cmd.exe 82 PID 3156 wrote to memory of 3352 3156 cmd.exe 83 PID 3156 wrote to memory of 3352 3156 cmd.exe 83 PID 3156 wrote to memory of 3352 3156 cmd.exe 83 PID 3156 wrote to memory of 4012 3156 cmd.exe 84 PID 3156 wrote to memory of 4012 3156 cmd.exe 84 PID 3156 wrote to memory of 4012 3156 cmd.exe 84 PID 3156 wrote to memory of 2812 3156 cmd.exe 85 PID 3156 wrote to memory of 2812 3156 cmd.exe 85 PID 3156 wrote to memory of 2812 3156 cmd.exe 85 PID 3372 wrote to memory of 1332 3372 keygen-pr.exe 86 PID 3372 wrote to memory of 1332 3372 keygen-pr.exe 86 PID 3372 wrote to memory of 1332 3372 keygen-pr.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe"C:\Users\Admin\AppData\Local\Temp\Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:4012 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:2376
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\2V4GILT5CK\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2V4GILT5CK\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2V4GILT5CK\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2V4GILT5CK\multitimer.exe" 1 3.1617560604.606a041c5d9b5 1016⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\2V4GILT5CK\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2V4GILT5CK\multitimer.exe" 2 3.1617560604.606a041c5d9b57⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\5jfzhsnjp5m\bja2acn4tln.exe"C:\Users\Admin\AppData\Local\Temp\5jfzhsnjp5m\bja2acn4tln.exe" /ustwo INSTALL8⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "bja2acn4tln.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\5jfzhsnjp5m\bja2acn4tln.exe" & exit9⤵PID:6368
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "bja2acn4tln.exe" /f10⤵
- Kills process with taskkill
PID:7064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\usi1xq0lw5x\app.exe"C:\Users\Admin\AppData\Local\Temp\usi1xq0lw5x\app.exe" /8-238⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\irmdpheae5b\vpn.exe"C:\Users\Admin\AppData\Local\Temp\irmdpheae5b\vpn.exe" /silent /subid=4828⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\is-PAJRD.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-PAJRD.tmp\vpn.tmp" /SL5="$40300,15170975,270336,C:\Users\Admin\AppData\Local\Temp\irmdpheae5b\vpn.exe" /silent /subid=4829⤵PID:5588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:5736
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:6280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\x3h2eoq24lt\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\x3h2eoq24lt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\is-47VHH.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-47VHH.tmp\IBInstaller_97039.tmp" /SL5="$20200,14575146,721408,C:\Users\Admin\AppData\Local\Temp\x3h2eoq24lt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5624
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-SLUDI.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5820
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-SLUDI.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:6100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\la5x03pnzun\mszce55lgdo.exe"C:\Users\Admin\AppData\Local\Temp\la5x03pnzun\mszce55lgdo.exe" /quiet SILENT=1 AF=7568⤵PID:5388
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\la5x03pnzun\mszce55lgdo.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\la5x03pnzun\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617301095 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\5bxpaof2hps\lrtlipaalbi.exe"C:\Users\Admin\AppData\Local\Temp\5bxpaof2hps\lrtlipaalbi.exe"8⤵PID:5180
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\5bxpaof2hps\lrtlipaalbi.exe"9⤵PID:6028
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4f3exyxpaun\vict.exe"C:\Users\Admin\AppData\Local\Temp\4f3exyxpaun\vict.exe" /VERYSILENT /id=5358⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\is-28KT4.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-28KT4.tmp\vict.tmp" /SL5="$201EA,870426,780800,C:\Users\Admin\AppData\Local\Temp\4f3exyxpaun\vict.exe" /VERYSILENT /id=5359⤵PID:5536
-
C:\Users\Admin\AppData\Local\Temp\is-59IVB.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-59IVB.tmp\win1host.exe" 53510⤵PID:5996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ygl4sfsr30f\p3vv5kus1ld.exe"C:\Users\Admin\AppData\Local\Temp\ygl4sfsr30f\p3vv5kus1ld.exe" /VERYSILENT8⤵PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\ksop5yhrjld\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\ksop5yhrjld\cpyrix.exe" /VERYSILENT8⤵PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\uy2liti3pm4\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\uy2liti3pm4\Setup3310.exe" /Verysilent /subid=5778⤵PID:2164
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\QVINXO46TH\setups.exe"C:\Users\Admin\AppData\Local\Temp\QVINXO46TH\setups.exe" ll5⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\is-6DSD3.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-6DSD3.tmp\setups.tmp" /SL5="$40114,454998,229376,C:\Users\Admin\AppData\Local\Temp\QVINXO46TH\setups.exe" ll6⤵PID:3552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:3116
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:4128
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:4912
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:5028
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:5060
-
C:\Users\Admin\AppData\Roaming\8F65.tmp.exe"C:\Users\Admin\AppData\Roaming\8F65.tmp.exe"5⤵PID:940
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w4514 --cpu-max-threads-hint 50 -r 99996⤵PID:2664
-
-
C:\Windows\system32\msiexec.exePID:4144
-
-
-
C:\Users\Admin\AppData\Roaming\934E.tmp.exe"C:\Users\Admin\AppData\Roaming\934E.tmp.exe"5⤵PID:4752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:3984
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:500
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4196
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4312
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4612
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\is-RM35E.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-RM35E.tmp\Setup3310.tmp" /SL5="$301F6,138429,56832,C:\Users\Admin\AppData\Local\Temp\uy2liti3pm4\Setup3310.exe" /Verysilent /subid=5771⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\is-TG3MA.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TG3MA.tmp\Setup.exe" /Verysilent2⤵PID:6052
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:5924
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:6076
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:5152
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\is-CON4T.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-CON4T.tmp\LabPicV3.tmp" /SL5="$20336,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\is-PD70J.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-PD70J.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:6568
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\is-PFJG3.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-PFJG3.tmp\lylal220.tmp" /SL5="$3026C,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\is-7B740.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-7B740.tmp\Microsoft.exe" /S /UID=lylal2205⤵PID:6804
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:5656
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"4⤵PID:6604
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install5⤵PID:7008
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5420
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"4⤵PID:6288
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install5⤵PID:6524
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\0Jm5LQEyZe9W.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\0Jm5LQEyZe9W.exe"3⤵PID:6040
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:4148
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:5836
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CGB8C.tmp\p3vv5kus1ld.tmp"C:\Users\Admin\AppData\Local\Temp\is-CGB8C.tmp\p3vv5kus1ld.tmp" /SL5="$401FA,2592217,780800,C:\Users\Admin\AppData\Local\Temp\ygl4sfsr30f\p3vv5kus1ld.exe" /VERYSILENT1⤵PID:5480
-
C:\Users\Admin\AppData\Local\Temp\is-25DD5.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-25DD5.tmp\winlthsth.exe"2⤵PID:4676
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5104
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0FD9288F1B2C11251D78F86F8F042467 C2⤵PID:5692
-