Analysis
-
max time kernel
61s -
max time network
65s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win7v20201028
General
-
Target
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
-
Size
5.2MB
-
MD5
ca3728b14865976c4f39d4b1dd058d4b
-
SHA1
41f57c0b052b0ac3a276463f6c09085efb049153
-
SHA256
829a3cefee8046496eb6bc03b2009891bec987a01ebe652bacc42292cf892418
-
SHA512
eabceb4164f54c8332da402ec6f5b91776dedc1b2a4ea1491217a3fed1d4f54bde5863605cbec7910f04f4265a2a9ae8b6dd95aad0ba3dba1ec6a0a26ee217e9
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 10 IoCs
pid Process 896 keygen-pr.exe 1004 keygen-step-1.exe 1124 keygen-step-3.exe 2104 keygen-step-4.exe 2252 key.exe 3488 Setup.exe 4624 multitimer.exe 4788 setups.exe 2888 askinstall20.exe 2632 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 148 ipinfo.io 144 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 3656 taskkill.exe 5272 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4676 PING.EXE 4608 PING.EXE 6140 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 150 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 145 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3488 Setup.exe Token: SeCreateTokenPrivilege 2888 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 2888 askinstall20.exe Token: SeLockMemoryPrivilege 2888 askinstall20.exe Token: SeIncreaseQuotaPrivilege 2888 askinstall20.exe Token: SeMachineAccountPrivilege 2888 askinstall20.exe Token: SeTcbPrivilege 2888 askinstall20.exe Token: SeSecurityPrivilege 2888 askinstall20.exe Token: SeTakeOwnershipPrivilege 2888 askinstall20.exe Token: SeLoadDriverPrivilege 2888 askinstall20.exe Token: SeSystemProfilePrivilege 2888 askinstall20.exe Token: SeSystemtimePrivilege 2888 askinstall20.exe Token: SeProfSingleProcessPrivilege 2888 askinstall20.exe Token: SeIncBasePriorityPrivilege 2888 askinstall20.exe Token: SeCreatePagefilePrivilege 2888 askinstall20.exe Token: SeCreatePermanentPrivilege 2888 askinstall20.exe Token: SeBackupPrivilege 2888 askinstall20.exe Token: SeRestorePrivilege 2888 askinstall20.exe Token: SeShutdownPrivilege 2888 askinstall20.exe Token: SeDebugPrivilege 2888 askinstall20.exe Token: SeAuditPrivilege 2888 askinstall20.exe Token: SeSystemEnvironmentPrivilege 2888 askinstall20.exe Token: SeChangeNotifyPrivilege 2888 askinstall20.exe Token: SeRemoteShutdownPrivilege 2888 askinstall20.exe Token: SeUndockPrivilege 2888 askinstall20.exe Token: SeSyncAgentPrivilege 2888 askinstall20.exe Token: SeEnableDelegationPrivilege 2888 askinstall20.exe Token: SeManageVolumePrivilege 2888 askinstall20.exe Token: SeImpersonatePrivilege 2888 askinstall20.exe Token: SeCreateGlobalPrivilege 2888 askinstall20.exe Token: 31 2888 askinstall20.exe Token: 32 2888 askinstall20.exe Token: 33 2888 askinstall20.exe Token: 34 2888 askinstall20.exe Token: 35 2888 askinstall20.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4788 setups.exe 2632 setups.tmp -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1016 4812 Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe 78 PID 4812 wrote to memory of 1016 4812 Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe 78 PID 4812 wrote to memory of 1016 4812 Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe 78 PID 1016 wrote to memory of 896 1016 cmd.exe 81 PID 1016 wrote to memory of 896 1016 cmd.exe 81 PID 1016 wrote to memory of 896 1016 cmd.exe 81 PID 1016 wrote to memory of 1004 1016 cmd.exe 82 PID 1016 wrote to memory of 1004 1016 cmd.exe 82 PID 1016 wrote to memory of 1004 1016 cmd.exe 82 PID 1016 wrote to memory of 1124 1016 cmd.exe 83 PID 1016 wrote to memory of 1124 1016 cmd.exe 83 PID 1016 wrote to memory of 1124 1016 cmd.exe 83 PID 1016 wrote to memory of 2104 1016 cmd.exe 84 PID 1016 wrote to memory of 2104 1016 cmd.exe 84 PID 1016 wrote to memory of 2104 1016 cmd.exe 84 PID 896 wrote to memory of 2252 896 keygen-pr.exe 85 PID 896 wrote to memory of 2252 896 keygen-pr.exe 85 PID 896 wrote to memory of 2252 896 keygen-pr.exe 85 PID 2104 wrote to memory of 3488 2104 keygen-step-4.exe 86 PID 2104 wrote to memory of 3488 2104 keygen-step-4.exe 86 PID 2252 wrote to memory of 4568 2252 key.exe 87 PID 2252 wrote to memory of 4568 2252 key.exe 87 PID 2252 wrote to memory of 4568 2252 key.exe 87 PID 1124 wrote to memory of 4540 1124 keygen-step-3.exe 88 PID 1124 wrote to memory of 4540 1124 keygen-step-3.exe 88 PID 1124 wrote to memory of 4540 1124 keygen-step-3.exe 88 PID 4540 wrote to memory of 4676 4540 cmd.exe 90 PID 4540 wrote to memory of 4676 4540 cmd.exe 90 PID 4540 wrote to memory of 4676 4540 cmd.exe 90 PID 3488 wrote to memory of 4624 3488 Setup.exe 91 PID 3488 wrote to memory of 4624 3488 Setup.exe 91 PID 3488 wrote to memory of 4788 3488 Setup.exe 92 PID 3488 wrote to memory of 4788 3488 Setup.exe 92 PID 3488 wrote to memory of 4788 3488 Setup.exe 92 PID 2104 wrote to memory of 2888 2104 keygen-step-4.exe 93 PID 2104 wrote to memory of 2888 2104 keygen-step-4.exe 93 PID 2104 wrote to memory of 2888 2104 keygen-step-4.exe 93 PID 4788 wrote to memory of 2632 4788 setups.exe 94 PID 4788 wrote to memory of 2632 4788 setups.exe 94 PID 4788 wrote to memory of 2632 4788 setups.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\SFAG4U65YW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SFAG4U65YW\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\SFAG4U65YW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SFAG4U65YW\multitimer.exe" 1 3.1617536554.6069a62a1b7d7 1016⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\SFAG4U65YW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SFAG4U65YW\multitimer.exe" 2 3.1617536554.6069a62a1b7d77⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\00rvtbqjpzw\f2p0fltb4a3.exe"C:\Users\Admin\AppData\Local\Temp\00rvtbqjpzw\f2p0fltb4a3.exe" /VERYSILENT8⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\is-98V12.tmp\f2p0fltb4a3.tmp"C:\Users\Admin\AppData\Local\Temp\is-98V12.tmp\f2p0fltb4a3.tmp" /SL5="$801D8,2592217,780800,C:\Users\Admin\AppData\Local\Temp\00rvtbqjpzw\f2p0fltb4a3.exe" /VERYSILENT9⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\is-H2367.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-H2367.tmp\winlthsth.exe"10⤵PID:6060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e02gadqwkc4\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\e02gadqwkc4\Setup3310.exe" /Verysilent /subid=5778⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\is-95DQI.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-95DQI.tmp\Setup3310.tmp" /SL5="$50302,138429,56832,C:\Users\Admin\AppData\Local\Temp\e02gadqwkc4\Setup3310.exe" /Verysilent /subid=5779⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\is-UOCOK.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-UOCOK.tmp\Setup.exe" /Verysilent10⤵PID:5980
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:3920
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:3764
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:2588
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\is-2AVKI.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-2AVKI.tmp\LabPicV3.tmp" /SL5="$3038A,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:3204
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:6088
-
C:\Users\Admin\AppData\Local\Temp\is-P9CIC.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-P9CIC.tmp\lylal220.tmp" /SL5="$50290,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:4300
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:5996
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:5964
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:6040
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"11⤵PID:720
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:4688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mippjvvjuof\vict.exe"C:\Users\Admin\AppData\Local\Temp\mippjvvjuof\vict.exe" /VERYSILENT /id=5358⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\is-I700H.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-I700H.tmp\vict.tmp" /SL5="$30308,870426,780800,C:\Users\Admin\AppData\Local\Temp\mippjvvjuof\vict.exe" /VERYSILENT /id=5359⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\is-EM12D.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-EM12D.tmp\win1host.exe" 53510⤵PID:5160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nquuq4hq23b\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\nquuq4hq23b\cpyrix.exe" /VERYSILENT8⤵PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\xlpokmifpfy\5u145wybu1y.exe"C:\Users\Admin\AppData\Local\Temp\xlpokmifpfy\5u145wybu1y.exe" /ustwo INSTALL8⤵PID:5860
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5u145wybu1y.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\xlpokmifpfy\5u145wybu1y.exe" & exit9⤵PID:5880
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5u145wybu1y.exe" /f10⤵
- Kills process with taskkill
PID:5272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sms2owtawfe\tbp3oal10hl.exe"C:\Users\Admin\AppData\Local\Temp\sms2owtawfe\tbp3oal10hl.exe"8⤵PID:5924
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\sms2owtawfe\tbp3oal10hl.exe"9⤵PID:5588
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:6140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\apgztlstwok\app.exe"C:\Users\Admin\AppData\Local\Temp\apgztlstwok\app.exe" /8-238⤵PID:5916
-
-
C:\Users\Admin\AppData\Local\Temp\jpla53elbrx\vpn.exe"C:\Users\Admin\AppData\Local\Temp\jpla53elbrx\vpn.exe" /silent /subid=4828⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\is-NV1G6.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-NV1G6.tmp\vpn.tmp" /SL5="$203CA,15170975,270336,C:\Users\Admin\AppData\Local\Temp\jpla53elbrx\vpn.exe" /silent /subid=4829⤵PID:5304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:1888
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:5380
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dcu11bjxuxq\cpgbvpefd0q.exe"C:\Users\Admin\AppData\Local\Temp\dcu11bjxuxq\cpgbvpefd0q.exe" /quiet SILENT=1 AF=7568⤵PID:5420
-
-
C:\Users\Admin\AppData\Local\Temp\enybkbewmxe\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\enybkbewmxe\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\is-ENV7N.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-ENV7N.tmp\IBInstaller_97039.tmp" /SL5="$901DA,14574507,721408,C:\Users\Admin\AppData\Local\Temp\enybkbewmxe\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5724
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-HJJN9.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:4084
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-HJJN9.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5204
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9SC4IA2ERK\setups.exe"C:\Users\Admin\AppData\Local\Temp\9SC4IA2ERK\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\is-BETGL.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-BETGL.tmp\setups.tmp" /SL5="$401CA,454998,229376,C:\Users\Admin\AppData\Local\Temp\9SC4IA2ERK\setups.exe" ll6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:2144
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:3012
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:1008
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4620
-
C:\Users\Admin\AppData\Roaming\DBA0.tmp.exe"C:\Users\Admin\AppData\Roaming\DBA0.tmp.exe"5⤵PID:208
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:2232
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Roaming\DE12.tmp.exe"C:\Users\Admin\AppData\Roaming\DE12.tmp.exe"5⤵PID:592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:368
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:4024
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:1484
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2172
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1432
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4508
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5928
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B77C3E9C61C3BF47049AC659B731C735 C2⤵PID:5212
-