Analysis
-
max time kernel
126s -
max time network
300s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
General
-
Target
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
-
Size
5.2MB
-
MD5
8d35cf69c1aca35ce0852f7376102627
-
SHA1
268f27a272d1b6696a9e4abb9270706e0a4cc099
-
SHA256
f2ca37f7eb8b9eb1e4eaa55ff92f57cf07107962f53eb58d9471e1c9b296de81
-
SHA512
4156091c5618f1ad50a15a1cca6852353e4b5da9a21203d834c8e163d30d765b74ffde806ec08b6579a5b13f0fd9a0831426452723ea9407ecae858fb1b0ad98
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/4388-243-0x00000000025D0000-0x0000000002EDA000-memory.dmp family_glupteba behavioral2/memory/4388-245-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/4388-244-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/796-149-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/796-148-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/796-153-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/796-256-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 10 IoCs
pid Process 2132 keygen-pr.exe 1336 keygen-step-1.exe 2068 keygen-step-3.exe 3900 keygen-step-4.exe 1764 key.exe 2232 Setup.exe 3580 multitimer.exe 1176 setups.exe 3972 setups.tmp 3784 askinstall20.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 3972 setups.tmp 3972 setups.tmp 3972 setups.tmp 3972 setups.tmp 3972 setups.tmp 3972 setups.tmp 3972 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 198 ip-api.com 320 ipinfo.io 326 ipinfo.io 156 ipinfo.io 158 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum gmmyh55HE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 gmmyh55HE.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 6012 5628 WerFault.exe 149 -
Delays execution with timeout.exe 2 IoCs
pid Process 576 timeout.exe 4396 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer gmmyh55HE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS gmmyh55HE.exe -
Kills process with taskkill 2 IoCs
pid Process 1492 taskkill.exe 5860 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{154875A5-ABC1-468D-8B94-E401B9A07551} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 9cab4b005929d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 998267c856add601 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000e162649b213ae0005b70563b9a992695f1b94d4ee58481e816a09a3c7ada213d488744d6ea6c234713f861dac3a2665fb2be44065816e1604c0c895167365f66c5940a72b2e49837bdb02aa4d94be636a33fc63a3b4ee506549d MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 580 PING.EXE 5040 PING.EXE 5864 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 157 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 161 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 324 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 330 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3972 setups.tmp 3972 setups.tmp 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe 3580 gmmyh55HE.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2232 Setup.exe Token: SeCreateTokenPrivilege 3784 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 3784 askinstall20.exe Token: SeLockMemoryPrivilege 3784 askinstall20.exe Token: SeIncreaseQuotaPrivilege 3784 askinstall20.exe Token: SeMachineAccountPrivilege 3784 askinstall20.exe Token: SeTcbPrivilege 3784 askinstall20.exe Token: SeSecurityPrivilege 3784 askinstall20.exe Token: SeTakeOwnershipPrivilege 3784 askinstall20.exe Token: SeLoadDriverPrivilege 3784 askinstall20.exe Token: SeSystemProfilePrivilege 3784 askinstall20.exe Token: SeSystemtimePrivilege 3784 askinstall20.exe Token: SeProfSingleProcessPrivilege 3784 askinstall20.exe Token: SeIncBasePriorityPrivilege 3784 askinstall20.exe Token: SeCreatePagefilePrivilege 3784 askinstall20.exe Token: SeCreatePermanentPrivilege 3784 askinstall20.exe Token: SeBackupPrivilege 3784 askinstall20.exe Token: SeRestorePrivilege 3784 askinstall20.exe Token: SeShutdownPrivilege 3784 askinstall20.exe Token: SeDebugPrivilege 3784 askinstall20.exe Token: SeAuditPrivilege 3784 askinstall20.exe Token: SeSystemEnvironmentPrivilege 3784 askinstall20.exe Token: SeChangeNotifyPrivilege 3784 askinstall20.exe Token: SeRemoteShutdownPrivilege 3784 askinstall20.exe Token: SeUndockPrivilege 3784 askinstall20.exe Token: SeSyncAgentPrivilege 3784 askinstall20.exe Token: SeEnableDelegationPrivilege 3784 askinstall20.exe Token: SeManageVolumePrivilege 3784 askinstall20.exe Token: SeImpersonatePrivilege 3784 askinstall20.exe Token: SeCreateGlobalPrivilege 3784 askinstall20.exe Token: 31 3784 askinstall20.exe Token: 32 3784 askinstall20.exe Token: 33 3784 askinstall20.exe Token: 34 3784 askinstall20.exe Token: 35 3784 askinstall20.exe Token: SeDebugPrivilege 3580 multitimer.exe Token: SeDebugPrivilege 1492 taskkill.exe Token: SeDebugPrivilege 3068 MicrosoftEdge.exe Token: SeDebugPrivilege 3068 MicrosoftEdge.exe Token: SeDebugPrivilege 3068 MicrosoftEdge.exe Token: SeDebugPrivilege 3068 MicrosoftEdge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1176 setups.exe 3972 setups.tmp 3068 MicrosoftEdge.exe 4164 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 496 wrote to memory of 2392 496 Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe 78 PID 496 wrote to memory of 2392 496 Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe 78 PID 496 wrote to memory of 2392 496 Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe 78 PID 2392 wrote to memory of 2132 2392 cmd.exe 81 PID 2392 wrote to memory of 2132 2392 cmd.exe 81 PID 2392 wrote to memory of 2132 2392 cmd.exe 81 PID 2392 wrote to memory of 1336 2392 cmd.exe 82 PID 2392 wrote to memory of 1336 2392 cmd.exe 82 PID 2392 wrote to memory of 1336 2392 cmd.exe 82 PID 2392 wrote to memory of 2068 2392 cmd.exe 83 PID 2392 wrote to memory of 2068 2392 cmd.exe 83 PID 2392 wrote to memory of 2068 2392 cmd.exe 83 PID 2392 wrote to memory of 3900 2392 cmd.exe 84 PID 2392 wrote to memory of 3900 2392 cmd.exe 84 PID 2392 wrote to memory of 3900 2392 cmd.exe 84 PID 2132 wrote to memory of 1764 2132 keygen-pr.exe 85 PID 2132 wrote to memory of 1764 2132 keygen-pr.exe 85 PID 2132 wrote to memory of 1764 2132 keygen-pr.exe 85 PID 3900 wrote to memory of 2232 3900 keygen-step-4.exe 86 PID 3900 wrote to memory of 2232 3900 keygen-step-4.exe 86 PID 2068 wrote to memory of 3896 2068 keygen-step-3.exe 87 PID 2068 wrote to memory of 3896 2068 keygen-step-3.exe 87 PID 2068 wrote to memory of 3896 2068 keygen-step-3.exe 87 PID 3896 wrote to memory of 580 3896 cmd.exe 89 PID 3896 wrote to memory of 580 3896 cmd.exe 89 PID 3896 wrote to memory of 580 3896 cmd.exe 89 PID 1764 wrote to memory of 736 1764 key.exe 90 PID 1764 wrote to memory of 736 1764 key.exe 90 PID 1764 wrote to memory of 736 1764 key.exe 90 PID 2232 wrote to memory of 3580 2232 Setup.exe 91 PID 2232 wrote to memory of 3580 2232 Setup.exe 91 PID 2232 wrote to memory of 1176 2232 Setup.exe 92 PID 2232 wrote to memory of 1176 2232 Setup.exe 92 PID 2232 wrote to memory of 1176 2232 Setup.exe 92 PID 1176 wrote to memory of 3972 1176 setups.exe 94 PID 1176 wrote to memory of 3972 1176 setups.exe 94 PID 1176 wrote to memory of 3972 1176 setups.exe 94 PID 3900 wrote to memory of 3784 3900 keygen-step-4.exe 93 PID 3900 wrote to memory of 3784 3900 keygen-step-4.exe 93 PID 3900 wrote to memory of 3784 3900 keygen-step-4.exe 93 PID 3784 wrote to memory of 1004 3784 askinstall20.exe 96 PID 3784 wrote to memory of 1004 3784 askinstall20.exe 96 PID 3784 wrote to memory of 1004 3784 askinstall20.exe 96 PID 1004 wrote to memory of 1492 1004 cmd.exe 99 PID 1004 wrote to memory of 1492 1004 cmd.exe 99 PID 1004 wrote to memory of 1492 1004 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe"C:\Users\Admin\AppData\Local\Temp\Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\YR8Q0TF023\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\YR8Q0TF023\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\YR8Q0TF023\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\YR8Q0TF023\multitimer.exe" 1 3.1617536613.6069a6657a65c 1016⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\YR8Q0TF023\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\YR8Q0TF023\multitimer.exe" 2 3.1617536613.6069a6657a65c7⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\dge0gptbgcb\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\dge0gptbgcb\cpyrix.exe" /VERYSILENT8⤵PID:2784
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\91c42f20-4cf1-479b-9777-e58b554e9c1b\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\91c42f20-4cf1-479b-9777-e58b554e9c1b\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\91c42f20-4cf1-479b-9777-e58b554e9c1b\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run10⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\91c42f20-4cf1-479b-9777-e58b554e9c1b\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\91c42f20-4cf1-479b-9777-e58b554e9c1b\AdvancedRun.exe" /SpecialRun 4101d8 603611⤵PID:4312
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force10⤵PID:3416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 110⤵PID:4204
-
C:\Windows\SysWOW64\timeout.exetimeout 111⤵
- Delays execution with timeout.exe
PID:4396
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"10⤵PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5628 -s 196010⤵
- Program crash
PID:6012
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:2240
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:1884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vbk5vj2p2de\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\vbk5vj2p2de\Setup3310.exe" /Verysilent /subid=5778⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\is-MRSP2.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-MRSP2.tmp\Setup3310.tmp" /SL5="$30310,138429,56832,C:\Users\Admin\AppData\Local\Temp\vbk5vj2p2de\Setup3310.exe" /Verysilent /subid=5779⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\is-0VSJV.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0VSJV.tmp\Setup.exe" /Verysilent10⤵PID:5384
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:3536
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:5448
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:3980
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\is-UAN98.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-UAN98.tmp\LabPicV3.tmp" /SL5="$20442,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\is-EKT5T.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-EKT5T.tmp\ppppppfy.exe" /S /UID=lab21413⤵PID:5856
-
C:\Program Files\Windows Photo Viewer\ZKVCWGHUBD\prolab.exe"C:\Program Files\Windows Photo Viewer\ZKVCWGHUBD\prolab.exe" /VERYSILENT14⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\is-K4V0V.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-K4V0V.tmp\prolab.tmp" /SL5="$6041C,575243,216576,C:\Program Files\Windows Photo Viewer\ZKVCWGHUBD\prolab.exe" /VERYSILENT15⤵PID:5552
-
-
-
C:\Users\Admin\AppData\Local\Temp\dc-215f0-4c3-09385-0665bfaf10386\Cuxevycaefy.exe"C:\Users\Admin\AppData\Local\Temp\dc-215f0-4c3-09385-0665bfaf10386\Cuxevycaefy.exe"14⤵PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\fb-5a92d-45b-60a9e-8b4e5d74a4054\ZHolydabyzhu.exe"C:\Users\Admin\AppData\Local\Temp\fb-5a92d-45b-60a9e-8b4e5d74a4054\ZHolydabyzhu.exe"14⤵PID:5504
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2n1lfiy5.rq3\md6_6ydj.exe & exit15⤵PID:6528
-
C:\Users\Admin\AppData\Local\Temp\2n1lfiy5.rq3\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\2n1lfiy5.rq3\md6_6ydj.exe16⤵PID:7112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5m4emyxk.leb\askinstall31.exe & exit15⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\5m4emyxk.leb\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\5m4emyxk.leb\askinstall31.exe16⤵PID:6500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\imodhoew.0a3\toolspab1.exe & exit15⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\imodhoew.0a3\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\imodhoew.0a3\toolspab1.exe16⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\imodhoew.0a3\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\imodhoew.0a3\toolspab1.exe17⤵PID:6844
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3xvxuxwf.bd0\GcleanerWW.exe /mixone & exit15⤵PID:2756
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\is-HTSE8.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-HTSE8.tmp\lylal220.tmp" /SL5="$3044E,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\is-84JKC.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-84JKC.tmp\Microsoft.exe" /S /UID=lylal22013⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\19-b1e2e-6b5-09393-8198a9f952528\Sidebaedela.exe"C:\Users\Admin\AppData\Local\Temp\19-b1e2e-6b5-09393-8198a9f952528\Sidebaedela.exe"14⤵PID:2148
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vjfquoue.zod\md6_6ydj.exe & exit15⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\vjfquoue.zod\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\vjfquoue.zod\md6_6ydj.exe16⤵PID:5516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ukfs352s.15n\askinstall31.exe & exit15⤵PID:7072
-
C:\Users\Admin\AppData\Local\Temp\ukfs352s.15n\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\ukfs352s.15n\askinstall31.exe16⤵PID:6248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wvy0ceoh.s5o\toolspab1.exe & exit15⤵PID:6404
-
C:\Users\Admin\AppData\Local\Temp\wvy0ceoh.s5o\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\wvy0ceoh.s5o\toolspab1.exe16⤵PID:6484
-
C:\Users\Admin\AppData\Local\Temp\wvy0ceoh.s5o\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\wvy0ceoh.s5o\toolspab1.exe17⤵PID:6236
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bvbkobzh.teo\GcleanerWW.exe /mixone & exit15⤵PID:6748
-
-
-
C:\Users\Admin\AppData\Local\Temp\cf-4bb79-21a-e1380-871b20ef9abe6\Lalijowaru.exe"C:\Users\Admin\AppData\Local\Temp\cf-4bb79-21a-e1380-871b20ef9abe6\Lalijowaru.exe"14⤵PID:5756
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:5344
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:392
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵PID:3532
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"11⤵PID:5380
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:5844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:4536
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:5296
-
C:\Users\Admin\AppData\Local\Temp\RY58279OSF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RY58279OSF\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵PID:5920
-
C:\Users\Admin\AppData\Local\Temp\RY58279OSF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RY58279OSF\multitimer.exe" 1 3.1617536717.6069a6cd70526 10313⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\RY58279OSF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RY58279OSF\multitimer.exe" 2 3.1617536717.6069a6cd7052614⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\3xpcx3jftgh\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\3xpcx3jftgh\cpyrix.exe" /VERYSILENT15⤵PID:6756
-
-
C:\Users\Admin\AppData\Local\Temp\s50yttjaiqq\c4olkosvunk.exe"C:\Users\Admin\AppData\Local\Temp\s50yttjaiqq\c4olkosvunk.exe" /ustwo INSTALL15⤵PID:6780
-
-
C:\Users\Admin\AppData\Local\Temp\2hw0r5go1b3\vpn.exe"C:\Users\Admin\AppData\Local\Temp\2hw0r5go1b3\vpn.exe" /silent /subid=48215⤵PID:6800
-
C:\Users\Admin\AppData\Local\Temp\is-QO5OH.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-QO5OH.tmp\vpn.tmp" /SL5="$30372,15170975,270336,C:\Users\Admin\AppData\Local\Temp\2hw0r5go1b3\vpn.exe" /silent /subid=48216⤵PID:6892
-
-
-
C:\Users\Admin\AppData\Local\Temp\h14pbbh0aaj\app.exe"C:\Users\Admin\AppData\Local\Temp\h14pbbh0aaj\app.exe" /8-2315⤵PID:7040
-
-
C:\Users\Admin\AppData\Local\Temp\iwbjyzlpwtc\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\iwbjyzlpwtc\Setup3310.exe" /Verysilent /subid=57715⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\is-NU4AV.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-NU4AV.tmp\Setup3310.tmp" /SL5="$3032C,138429,56832,C:\Users\Admin\AppData\Local\Temp\iwbjyzlpwtc\Setup3310.exe" /Verysilent /subid=57716⤵PID:6904
-
-
-
C:\Users\Admin\AppData\Local\Temp\enxleg4waa3\vict.exe"C:\Users\Admin\AppData\Local\Temp\enxleg4waa3\vict.exe" /VERYSILENT /id=53515⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\is-OGV58.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-OGV58.tmp\vict.tmp" /SL5="$204E6,870426,780800,C:\Users\Admin\AppData\Local\Temp\enxleg4waa3\vict.exe" /VERYSILENT /id=53516⤵PID:6724
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\T4R408GYXS\setups.exe"C:\Users\Admin\AppData\Local\Temp\T4R408GYXS\setups.exe" ll12⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\is-4JS72.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-4JS72.tmp\setups.tmp" /SL5="$3039A,454998,229376,C:\Users\Admin\AppData\Local\Temp\T4R408GYXS\setups.exe" ll13⤵PID:4820
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:5796
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:3212
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:4552
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵PID:4588
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\l0osvnrbw1r\tbsxq1gdaz1.exe"C:\Users\Admin\AppData\Local\Temp\l0osvnrbw1r\tbsxq1gdaz1.exe" /VERYSILENT8⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\is-1S5PR.tmp\tbsxq1gdaz1.tmp"C:\Users\Admin\AppData\Local\Temp\is-1S5PR.tmp\tbsxq1gdaz1.tmp" /SL5="$20242,2592217,780800,C:\Users\Admin\AppData\Local\Temp\l0osvnrbw1r\tbsxq1gdaz1.exe" /VERYSILENT9⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\is-LEG63.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-LEG63.tmp\winlthsth.exe"10⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\gSPE0nF4l.exe"C:\Users\Admin\AppData\Local\Temp\gSPE0nF4l.exe"11⤵PID:7032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mmn0ciesvup\dfbv2c2foel.exe"C:\Users\Admin\AppData\Local\Temp\mmn0ciesvup\dfbv2c2foel.exe"8⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\mmn0ciesvup\dfbv2c2foel.exe"9⤵PID:5708
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cvblygtxmxa\5fd1nnzgikb.exe"C:\Users\Admin\AppData\Local\Temp\cvblygtxmxa\5fd1nnzgikb.exe" /quiet SILENT=1 AF=7568⤵PID:3924
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\cvblygtxmxa\5fd1nnzgikb.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\cvblygtxmxa\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617284613 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\cr1ewmgd0j2\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\cr1ewmgd0j2\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\is-I1Q3P.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-I1Q3P.tmp\IBInstaller_97039.tmp" /SL5="$3046E,14574507,721408,C:\Users\Admin\AppData\Local\Temp\cr1ewmgd0j2\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5220
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-9TCUD.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5388
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-9TCUD.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5616
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\iu1saeupntx\app.exe"C:\Users\Admin\AppData\Local\Temp\iu1saeupntx\app.exe" /8-238⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\t55hft0ojw0\vict.exe"C:\Users\Admin\AppData\Local\Temp\t55hft0ojw0\vict.exe" /VERYSILENT /id=5358⤵PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\qaxkkysybey\00oi1lcbf5g.exe"C:\Users\Admin\AppData\Local\Temp\qaxkkysybey\00oi1lcbf5g.exe" /ustwo INSTALL8⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "00oi1lcbf5g.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\qaxkkysybey\00oi1lcbf5g.exe" & exit9⤵PID:5168
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "00oi1lcbf5g.exe" /f10⤵
- Kills process with taskkill
PID:5860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fba3jxqywub\vpn.exe"C:\Users\Admin\AppData\Local\Temp\fba3jxqywub\vpn.exe" /silent /subid=4828⤵PID:2200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HZRQNTQ4YL\setups.exe"C:\Users\Admin\AppData\Local\Temp\HZRQNTQ4YL\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\is-2QIVI.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-2QIVI.tmp\setups.tmp" /SL5="$400CA,454998,229376,C:\Users\Admin\AppData\Local\Temp\HZRQNTQ4YL\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:4316
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4468
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4528
-
C:\Users\Admin\AppData\Roaming\6676.tmp.exe"C:\Users\Admin\AppData\Roaming\6676.tmp.exe"5⤵PID:2200
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:2860
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\is-69EEM.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-69EEM.tmp\vpn.tmp" /SL5="$20264,15170975,270336,C:\Users\Admin\AppData\Local\Temp\fba3jxqywub\vpn.exe" /silent /subid=4826⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "7⤵PID:5840
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09018⤵PID:5556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "7⤵PID:3952
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09018⤵PID:3460
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\6AEC.tmp.exe"C:\Users\Admin\AppData\Roaming\6AEC.tmp.exe"5⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\6AEC.tmp.exe6⤵PID:1600
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:576
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:4708
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵PID:1076
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3068
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2328
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4164
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\is-RI7V8.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-RI7V8.tmp\vict.tmp" /SL5="$2030E,870426,780800,C:\Users\Admin\AppData\Local\Temp\t55hft0ojw0\vict.exe" /VERYSILENT /id=5351⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\is-9HSHK.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-9HSHK.tmp\win1host.exe" 5352⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\gmmyh55HE.exe"C:\Users\Admin\AppData\Local\Temp\gmmyh55HE.exe"3⤵
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5364
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2BF27A4A950AFDA57C39808033FB16C2 C2⤵PID:5916
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3CC9DF3B8500A5540755F900A3C0DA982⤵PID:632
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:1172
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5696
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\512640b0fe7241b1b4667bc1eed19223 /t 5244 /p 11721⤵PID:4292
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:6916
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{21132a75-6c1e-074a-a196-6d5ed7aa215e}\oemvista.inf" "9" "4d14a44ff" "0000000000000124" "WinSta0\Default" "0000000000000170" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:6520
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000124"2⤵PID:6656
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:6888
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:6884