Analysis
-
max time kernel
60s -
max time network
59s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 10:28
Static task
static1
Behavioral task
behavioral1
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
Resource
win10v20201028
General
-
Target
Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe
-
Size
5.2MB
-
MD5
8d35cf69c1aca35ce0852f7376102627
-
SHA1
268f27a272d1b6696a9e4abb9270706e0a4cc099
-
SHA256
f2ca37f7eb8b9eb1e4eaa55ff92f57cf07107962f53eb58d9471e1c9b296de81
-
SHA512
4156091c5618f1ad50a15a1cca6852353e4b5da9a21203d834c8e163d30d765b74ffde806ec08b6579a5b13f0fd9a0831426452723ea9407ecae858fb1b0ad98
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral1/memory/5736-209-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral1/memory/5736-210-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral1/memory/5736-211-0x0000000002570000-0x0000000002E7A000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral1/memory/5308-175-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/5308-172-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/5308-202-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/5308-229-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 8 IoCs
pid Process 3036 keygen-pr.exe 564 keygen-step-1.exe 4092 keygen-step-3.exe 4332 keygen-step-4.exe 1444 key.exe 1720 Setup.exe 2244 key.exe 4660 multitimer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 121 ipinfo.io 124 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1444 set thread context of 2244 1444 key.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 3336 taskkill.exe 1452 taskkill.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2416 PING.EXE 5440 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 123 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 140 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1720 Setup.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3812 4708 Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe 78 PID 4708 wrote to memory of 3812 4708 Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe 78 PID 4708 wrote to memory of 3812 4708 Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe 78 PID 3812 wrote to memory of 3036 3812 cmd.exe 81 PID 3812 wrote to memory of 3036 3812 cmd.exe 81 PID 3812 wrote to memory of 3036 3812 cmd.exe 81 PID 3812 wrote to memory of 564 3812 cmd.exe 82 PID 3812 wrote to memory of 564 3812 cmd.exe 82 PID 3812 wrote to memory of 564 3812 cmd.exe 82 PID 3812 wrote to memory of 4092 3812 cmd.exe 83 PID 3812 wrote to memory of 4092 3812 cmd.exe 83 PID 3812 wrote to memory of 4092 3812 cmd.exe 83 PID 3812 wrote to memory of 4332 3812 cmd.exe 84 PID 3812 wrote to memory of 4332 3812 cmd.exe 84 PID 3812 wrote to memory of 4332 3812 cmd.exe 84 PID 3036 wrote to memory of 1444 3036 keygen-pr.exe 85 PID 3036 wrote to memory of 1444 3036 keygen-pr.exe 85 PID 3036 wrote to memory of 1444 3036 keygen-pr.exe 85 PID 4332 wrote to memory of 1720 4332 keygen-step-4.exe 86 PID 4332 wrote to memory of 1720 4332 keygen-step-4.exe 86 PID 4092 wrote to memory of 1748 4092 keygen-step-3.exe 87 PID 4092 wrote to memory of 1748 4092 keygen-step-3.exe 87 PID 4092 wrote to memory of 1748 4092 keygen-step-3.exe 87 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1444 wrote to memory of 2244 1444 key.exe 89 PID 1748 wrote to memory of 2416 1748 cmd.exe 91 PID 1748 wrote to memory of 2416 1748 cmd.exe 91 PID 1748 wrote to memory of 2416 1748 cmd.exe 91 PID 1720 wrote to memory of 4660 1720 Setup.exe 92 PID 1720 wrote to memory of 4660 1720 Setup.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe"C:\Users\Admin\AppData\Local\Temp\Ciel.Compta.19.0.v.230.00.530.serial.number.keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\OODILR8FUP\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OODILR8FUP\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\OODILR8FUP\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OODILR8FUP\multitimer.exe" 1 3.1617532112.606994d0a597c 1016⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\OODILR8FUP\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OODILR8FUP\multitimer.exe" 2 3.1617532112.606994d0a597c7⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\a32s552u0sg\frqyk42xmwf.exe"C:\Users\Admin\AppData\Local\Temp\a32s552u0sg\frqyk42xmwf.exe" /VERYSILENT8⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\is-C499O.tmp\frqyk42xmwf.tmp"C:\Users\Admin\AppData\Local\Temp\is-C499O.tmp\frqyk42xmwf.tmp" /SL5="$102E4,2592217,780800,C:\Users\Admin\AppData\Local\Temp\a32s552u0sg\frqyk42xmwf.exe" /VERYSILENT9⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\is-2JKJ0.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-2JKJ0.tmp\winlthsth.exe"10⤵PID:5644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ouwkoyaqroy\vict.exe"C:\Users\Admin\AppData\Local\Temp\ouwkoyaqroy\vict.exe" /VERYSILENT /id=5358⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\is-37CSG.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-37CSG.tmp\vict.tmp" /SL5="$2030C,870426,780800,C:\Users\Admin\AppData\Local\Temp\ouwkoyaqroy\vict.exe" /VERYSILENT /id=5359⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\is-9B49E.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-9B49E.tmp\win1host.exe" 53510⤵PID:4804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fmgeifya25c\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\fmgeifya25c\cpyrix.exe" /VERYSILENT8⤵PID:5348
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5132
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5252
-
-
-
C:\Users\Admin\AppData\Local\Temp\fkpm0buk2zi\4ogx12w4pld.exe"C:\Users\Admin\AppData\Local\Temp\fkpm0buk2zi\4ogx12w4pld.exe"8⤵PID:5484
-
-
C:\Users\Admin\AppData\Local\Temp\vhhggaz4bpt\nsgpwu1bsb3.exe"C:\Users\Admin\AppData\Local\Temp\vhhggaz4bpt\nsgpwu1bsb3.exe" /ustwo INSTALL8⤵PID:5616
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "nsgpwu1bsb3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\vhhggaz4bpt\nsgpwu1bsb3.exe" & exit9⤵PID:5296
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "nsgpwu1bsb3.exe" /f10⤵
- Kills process with taskkill
PID:1452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\etnqxnyy0dd\app.exe"C:\Users\Admin\AppData\Local\Temp\etnqxnyy0dd\app.exe" /8-238⤵PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\212gn5p3z5z\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\212gn5p3z5z\Setup3310.exe" /Verysilent /subid=5778⤵PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\aalyughh3ft\xicnd1e23x3.exe"C:\Users\Admin\AppData\Local\Temp\aalyughh3ft\xicnd1e23x3.exe" /quiet SILENT=1 AF=7568⤵PID:5956
-
-
C:\Users\Admin\AppData\Local\Temp\zsed0q5egzm\vpn.exe"C:\Users\Admin\AppData\Local\Temp\zsed0q5egzm\vpn.exe" /silent /subid=4828⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\is-2VMKJ.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-2VMKJ.tmp\vpn.tmp" /SL5="$1043A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\zsed0q5egzm\vpn.exe" /silent /subid=4829⤵PID:6052
-
-
-
C:\Users\Admin\AppData\Local\Temp\m2w3nwcyr4m\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\m2w3nwcyr4m\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\is-MGOI3.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-MGOI3.tmp\IBInstaller_97039.tmp" /SL5="$5036A,14575005,721408,C:\Users\Admin\AppData\Local\Temp\m2w3nwcyr4m\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-ILCUR.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5848
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-ILCUR.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5728
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8KDQJ5V1V5\setups.exe"C:\Users\Admin\AppData\Local\Temp\8KDQJ5V1V5\setups.exe" ll5⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\is-DK6QF.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-DK6QF.tmp\setups.tmp" /SL5="$4003A,635399,250368,C:\Users\Admin\AppData\Local\Temp\8KDQJ5V1V5\setups.exe" ll6⤵PID:2960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:212
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:3500
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:4776
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4800
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:3452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:1388
-
C:\Users\Admin\AppData\Roaming\9725.tmp.exe"C:\Users\Admin\AppData\Roaming\9725.tmp.exe"5⤵PID:2580
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:3364
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5308
-
-
-
C:\Users\Admin\AppData\Roaming\987E.tmp.exe"C:\Users\Admin\AppData\Roaming\987E.tmp.exe"5⤵PID:4068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:5036
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:4836
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4424
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4492
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4588
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\is-B78C5.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-B78C5.tmp\Setup3310.tmp" /SL5="$10300,138429,56832,C:\Users\Admin\AppData\Local\Temp\212gn5p3z5z\Setup3310.exe" /Verysilent /subid=5771⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\is-HRO66.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-HRO66.tmp\Setup.exe" /Verysilent2⤵PID:1696
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:5600
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:4324
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:5372
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\is-V2VMQ.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-V2VMQ.tmp\LabPicV3.tmp" /SL5="$303D2,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:2332
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\is-8AC16.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-8AC16.tmp\lylal220.tmp" /SL5="$303D4,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:652
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5568
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:6032
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:5832
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"3⤵PID:2204
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:2292
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:6112
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7A8A37CAFB8DCA388520107BD6D09D62 C2⤵PID:5324
-