Analysis
-
max time kernel
18s -
max time network
62s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 05:12
Static task
static1
Behavioral task
behavioral1
Sample
Mbaxp.1.4.9.key.generator.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Mbaxp.1.4.9.key.generator.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Mbaxp.1.4.9.key.generator.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Mbaxp.1.4.9.key.generator.exe
Resource
win10v20201028
General
-
Target
Mbaxp.1.4.9.key.generator.exe
-
Size
5.2MB
-
MD5
a438d3b681e5250cad13ffbc5a8b1e5f
-
SHA1
e8106fabc033378b3644aa34b815147a77b83539
-
SHA256
297d988321fbbbadd950e60e649f2252049e4380b5824594113ea34c13a41410
-
SHA512
9727bbfc48c98c6caab97bf782122dd18e0cad567a1e7010a827086fc2db91abe85eb23e2cab7c538d9f7f2ffc3ee37463f3ed4c46b329800d76b8b650673c40
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral1/memory/3116-201-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral1/memory/6064-150-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/6064-149-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/6064-163-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/6064-220-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 10 IoCs
pid Process 4056 keygen-pr.exe 4064 keygen-step-1.exe 3392 keygen-step-3.exe 4428 keygen-step-4.exe 1576 key.exe 1596 Setup.exe 4648 multitimer.exe 4660 setups.exe 232 askinstall20.exe 208 setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 208 setups.tmp 208 setups.tmp 208 setups.tmp 208 setups.tmp 208 setups.tmp 208 setups.tmp 208 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 124 ipinfo.io 130 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 4992 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2348 PING.EXE 5308 PING.EXE 4516 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 125 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 208 setups.tmp 208 setups.tmp -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1596 Setup.exe Token: SeCreateTokenPrivilege 232 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 232 askinstall20.exe Token: SeLockMemoryPrivilege 232 askinstall20.exe Token: SeIncreaseQuotaPrivilege 232 askinstall20.exe Token: SeMachineAccountPrivilege 232 askinstall20.exe Token: SeTcbPrivilege 232 askinstall20.exe Token: SeSecurityPrivilege 232 askinstall20.exe Token: SeTakeOwnershipPrivilege 232 askinstall20.exe Token: SeLoadDriverPrivilege 232 askinstall20.exe Token: SeSystemProfilePrivilege 232 askinstall20.exe Token: SeSystemtimePrivilege 232 askinstall20.exe Token: SeProfSingleProcessPrivilege 232 askinstall20.exe Token: SeIncBasePriorityPrivilege 232 askinstall20.exe Token: SeCreatePagefilePrivilege 232 askinstall20.exe Token: SeCreatePermanentPrivilege 232 askinstall20.exe Token: SeBackupPrivilege 232 askinstall20.exe Token: SeRestorePrivilege 232 askinstall20.exe Token: SeShutdownPrivilege 232 askinstall20.exe Token: SeDebugPrivilege 232 askinstall20.exe Token: SeAuditPrivilege 232 askinstall20.exe Token: SeSystemEnvironmentPrivilege 232 askinstall20.exe Token: SeChangeNotifyPrivilege 232 askinstall20.exe Token: SeRemoteShutdownPrivilege 232 askinstall20.exe Token: SeUndockPrivilege 232 askinstall20.exe Token: SeSyncAgentPrivilege 232 askinstall20.exe Token: SeEnableDelegationPrivilege 232 askinstall20.exe Token: SeManageVolumePrivilege 232 askinstall20.exe Token: SeImpersonatePrivilege 232 askinstall20.exe Token: SeCreateGlobalPrivilege 232 askinstall20.exe Token: 31 232 askinstall20.exe Token: 32 232 askinstall20.exe Token: 33 232 askinstall20.exe Token: 34 232 askinstall20.exe Token: 35 232 askinstall20.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 4648 multitimer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4660 setups.exe 208 setups.tmp -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4688 wrote to memory of 3860 4688 Mbaxp.1.4.9.key.generator.exe 78 PID 4688 wrote to memory of 3860 4688 Mbaxp.1.4.9.key.generator.exe 78 PID 4688 wrote to memory of 3860 4688 Mbaxp.1.4.9.key.generator.exe 78 PID 3860 wrote to memory of 4056 3860 cmd.exe 81 PID 3860 wrote to memory of 4056 3860 cmd.exe 81 PID 3860 wrote to memory of 4056 3860 cmd.exe 81 PID 3860 wrote to memory of 4064 3860 cmd.exe 82 PID 3860 wrote to memory of 4064 3860 cmd.exe 82 PID 3860 wrote to memory of 4064 3860 cmd.exe 82 PID 3860 wrote to memory of 3392 3860 cmd.exe 83 PID 3860 wrote to memory of 3392 3860 cmd.exe 83 PID 3860 wrote to memory of 3392 3860 cmd.exe 83 PID 3860 wrote to memory of 4428 3860 cmd.exe 84 PID 3860 wrote to memory of 4428 3860 cmd.exe 84 PID 3860 wrote to memory of 4428 3860 cmd.exe 84 PID 4056 wrote to memory of 1576 4056 keygen-pr.exe 85 PID 4056 wrote to memory of 1576 4056 keygen-pr.exe 85 PID 4056 wrote to memory of 1576 4056 keygen-pr.exe 85 PID 4428 wrote to memory of 1596 4428 keygen-step-4.exe 86 PID 4428 wrote to memory of 1596 4428 keygen-step-4.exe 86 PID 3392 wrote to memory of 2052 3392 keygen-step-3.exe 87 PID 3392 wrote to memory of 2052 3392 keygen-step-3.exe 87 PID 3392 wrote to memory of 2052 3392 keygen-step-3.exe 87 PID 2052 wrote to memory of 2348 2052 cmd.exe 89 PID 2052 wrote to memory of 2348 2052 cmd.exe 89 PID 2052 wrote to memory of 2348 2052 cmd.exe 89 PID 1576 wrote to memory of 2424 1576 key.exe 90 PID 1576 wrote to memory of 2424 1576 key.exe 90 PID 1576 wrote to memory of 2424 1576 key.exe 90 PID 1596 wrote to memory of 4648 1596 Setup.exe 91 PID 1596 wrote to memory of 4648 1596 Setup.exe 91 PID 1596 wrote to memory of 4660 1596 Setup.exe 92 PID 1596 wrote to memory of 4660 1596 Setup.exe 92 PID 1596 wrote to memory of 4660 1596 Setup.exe 92 PID 4428 wrote to memory of 232 4428 keygen-step-4.exe 93 PID 4428 wrote to memory of 232 4428 keygen-step-4.exe 93 PID 4428 wrote to memory of 232 4428 keygen-step-4.exe 93 PID 4660 wrote to memory of 208 4660 setups.exe 94 PID 4660 wrote to memory of 208 4660 setups.exe 94 PID 4660 wrote to memory of 208 4660 setups.exe 94 PID 232 wrote to memory of 4620 232 askinstall20.exe 95 PID 232 wrote to memory of 4620 232 askinstall20.exe 95 PID 232 wrote to memory of 4620 232 askinstall20.exe 95 PID 4620 wrote to memory of 4992 4620 cmd.exe 98 PID 4620 wrote to memory of 4992 4620 cmd.exe 98 PID 4620 wrote to memory of 4992 4620 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mbaxp.1.4.9.key.generator.exe"C:\Users\Admin\AppData\Local\Temp\Mbaxp.1.4.9.key.generator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\OV4N2LSH4O\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OV4N2LSH4O\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\OV4N2LSH4O\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OV4N2LSH4O\multitimer.exe" 1 3.1617513183.60694adfa0283 1016⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\OV4N2LSH4O\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OV4N2LSH4O\multitimer.exe" 2 3.1617513183.60694adfa02837⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\cjrhn1odezc\cf4teg3qsjo.exe"C:\Users\Admin\AppData\Local\Temp\cjrhn1odezc\cf4teg3qsjo.exe"8⤵PID:660
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\cjrhn1odezc\cf4teg3qsjo.exe"9⤵PID:5876
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:4516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uqvvij3s42e\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\uqvvij3s42e\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\is-O4DFL.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-O4DFL.tmp\IBInstaller_97039.tmp" /SL5="$202C4,14575144,721408,C:\Users\Admin\AppData\Local\Temp\uqvvij3s42e\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5544
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-E4S9D.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5688
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-E4S9D.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5816
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\qwdchumpgdd\t5f0sng13x0.exe"C:\Users\Admin\AppData\Local\Temp\qwdchumpgdd\t5f0sng13x0.exe" /VERYSILENT8⤵PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\2dbuomkd0le\242exac3pvw.exe"C:\Users\Admin\AppData\Local\Temp\2dbuomkd0le\242exac3pvw.exe" /quiet SILENT=1 AF=7568⤵PID:960
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\2dbuomkd0le\242exac3pvw.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\2dbuomkd0le\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617254105 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\114a0rpg0fq\vpn.exe"C:\Users\Admin\AppData\Local\Temp\114a0rpg0fq\vpn.exe" /silent /subid=4828⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\jdoc4edljeu\vict.exe"C:\Users\Admin\AppData\Local\Temp\jdoc4edljeu\vict.exe" /VERYSILENT /id=5358⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\sp2kjnfoql5\app.exe"C:\Users\Admin\AppData\Local\Temp\sp2kjnfoql5\app.exe" /8-238⤵PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\rlbvxrfurwv\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\rlbvxrfurwv\cpyrix.exe" /VERYSILENT8⤵PID:5456
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:1400
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ch4v1szpmp\n5jvieee0aj.exe"C:\Users\Admin\AppData\Local\Temp\3ch4v1szpmp\n5jvieee0aj.exe" /ustwo INSTALL8⤵PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\lkf4jz3f1dl\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\lkf4jz3f1dl\Setup3310.exe" /Verysilent /subid=5778⤵PID:5444
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\JH92CESL13\setups.exe"C:\Users\Admin\AppData\Local\Temp\JH92CESL13\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\is-ADGJP.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-ADGJP.tmp\setups.tmp" /SL5="$80048,635399,250368,C:\Users\Admin\AppData\Local\Temp\JH92CESL13\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"4⤵PID:4420
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:1288
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:2432
-
C:\Users\Admin\AppData\Roaming\8766.tmp.exe"C:\Users\Admin\AppData\Roaming\8766.tmp.exe"5⤵PID:4256
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:5344
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:6064
-
-
-
C:\Users\Admin\AppData\Roaming\8880.tmp.exe"C:\Users\Admin\AppData\Roaming\8880.tmp.exe"5⤵PID:5068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5140
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5212
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:708
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3496
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4448
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\is-849MI.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-849MI.tmp\Setup3310.tmp" /SL5="$202C0,138429,56832,C:\Users\Admin\AppData\Local\Temp\lkf4jz3f1dl\Setup3310.exe" /Verysilent /subid=5771⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\is-RJU3R.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-RJU3R.tmp\Setup.exe" /Verysilent2⤵PID:1632
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:672
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:5744
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:5980
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\is-0K5GE.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-0K5GE.tmp\LabPicV3.tmp" /SL5="$203EC,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:1148
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\is-8CAAF.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-8CAAF.tmp\lylal220.tmp" /SL5="$203EE,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:5928
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:6132
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5956
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:6016
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"3⤵PID:5572
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:4268
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-NCVQQ.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-NCVQQ.tmp\vict.tmp" /SL5="$2022A,870426,780800,C:\Users\Admin\AppData\Local\Temp\jdoc4edljeu\vict.exe" /VERYSILENT /id=5351⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\is-QU0EM.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-QU0EM.tmp\win1host.exe" 5352⤵PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\is-QNC1M.tmp\t5f0sng13x0.tmp"C:\Users\Admin\AppData\Local\Temp\is-QNC1M.tmp\t5f0sng13x0.tmp" /SL5="$3023E,2592217,780800,C:\Users\Admin\AppData\Local\Temp\qwdchumpgdd\t5f0sng13x0.exe" /VERYSILENT1⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\is-ELNV4.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-ELNV4.tmp\winlthsth.exe"2⤵PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\is-9350R.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-9350R.tmp\vpn.tmp" /SL5="$3029C,15170975,270336,C:\Users\Admin\AppData\Local\Temp\114a0rpg0fq\vpn.exe" /silent /subid=4821⤵PID:2160
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:3496
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D25A3C36F30C11905C0ABC73242E700B C2⤵PID:5680
-