'xm32b.exe' CPU Miner

The xm32b.exe CPU Miner is a program that is a customized version of the XMRig CPU Miner that we reported in June 2017. The xm32b.exe CPU Miner is used by threat actors with unauthorized access to some computers across the globe. The xm32b.exe CPU Miner is nearly identical to the original project at h[tt]ps://github[.]com/xmrig/xmrig, except for a few modifications. The xm32b.exe CPU Miner is dropped onto compromised machines via Trojan droppers, and it is used to mine for Monero coins h[tt]ps://monero[.]org. The xm32b.exe CPU Miner utilizes same blockchain technology beneath Bitcoin and many other alternative digital currencies. Threat actors hijack the processing power of the infected machines by running the xm32b.exe CPU Miner and connecting to the public mining pools. The xm32b.exe CPU Miner is deemed as a Potentially Unwanted program (PUP) that might be used for nefarious purposes. Applications like the xm32b.exe CPU Miner are used to process data blocks of Monero transactions, and the people who operate the xm32b.exe network are granted a processing fee. However, users who are unaware of the xm32b.exe CPU Miner activity on their machines gain nothing. Computers infected with the xm32b.exe CPU Miner exhibit slower performance and program crashes. You can remove the unwanted instances of the xm32b.exe with the help of a respected anti-malware utility. Corrupted copies of XMRig are registered daily by cybersecurity vendors. Some of the variants we have encountered in our research include:

2d634303ca9312a24bab137928b72fa.exe, Adobe_Arkalis.exe, ApplicationModule.exe, Brhost.exe, Crofx.exe, DahjService.exe, Dapp.exe, DataKeeper.exe.exe, Decryptor.exe, HostStore.exe, IntelResource.exe, Lightning.exe, Msert.exe, NCShop.exe, Pluguin.exe, Pqrstu.exe, RGMUpdater.exe, RuntimeBroker.exe, ServiceST.exe, Sessionmanager.exe, Srvsbin64.exe, SystemAgent.exe, TelemetricSys.exe, Villastring.exe, Winreg64.exe, Zering.exe, activation.exe, admresDJT.exe, adobecp2.exe, amd1.exe , audiodig.exe, buwctr.exe , bvyvdvdx.exe, cdrom.exe, cocyama.exe, csrsm.exe, dccws.exe, dether.exe, dsdsd.exe, dy46884200658.exe, fa4hXWJAswUx Updater.exe, genoil.exe, gfxa.exe, gfxdrv.exe, ico.exe, ifgker.exe, igfxEMS.exe, iis.exe, infozam.exe, intel64.exe, jhProtominer.exe, ld3.exe, llatdsvc.exe, lost.exe, mccew.exe , mcrservice.exe, mcupdate.exe, mina.exe, mscorswv.exe, mstsc.exe, mstsc.exe , need.exe, nsoss.exe, nvidiam.exe, phtwog.exe, powercore.exe, powercoremain.exe, prompt.exe, replaces.exe, rtCru.exe, sa.exe, sprotect.exe, ssms1.exe, syshost.exe, system0.exe, taskmgrs.exe, thatcomes.exe , vghost.exe, vsupport.exe, wabmig.exe, webdav.exe, wekfgbtv4ddj.exe, wget_1_19_4.exe, winenit.exe, winsrc.exe, xm32b.exe, yewu1.exe

Associated folders:

C:\Program Files (x86)\Adobe Arkalis\Adobe_Arkalis.exe
C:\Program Files (x86)\Microsoft\Pluguin.exe
C:\Program Files (x86)\fa4hXWJAswUx Updater\fa4hXWJAswUx Updater.exe
C:\ProgramData\AppmallosayoV\Zering.exe
C:\ProgramData\browser\prompt.exe
C:\ProgramData\kipolam\Villastring.exe
C:\ProgramData\lost.exe
C:\Users\username\AppData\AdobeNMS\x64\sprotect.exe
C:\Users\username\AppData\Adobe\gfx\sfx6\gfxa.exe
C:\Users\username\AppData\Adobe\gfxa\gfxa.exe
C:\Users\username\AppData\Local\Temp\00390933\myscreenpro.exe
C:\Users\username\AppData\Local\ifgker\ifgker.exe
C:\Users\username\AppData\RGMService\RGMUpdater.exe
C:\Users\username\AppData\Roaming\Decryptor.exe
C:\Users\username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\admresDJT.exe
C:\Users\username\AppData\Roaming\adobecp2.exe
C:\Users\username\AppData\Temp\3B2B.tmp\Sessionmanager.exe
C:\Users\username\AppData\adobe\cp\dether.exe
C:\Users\username\AppData\adobe\phtwog.exe
C:\Users\username\AppData\bvyvdvdx\bvyvdvdx.exe
C:\Users\username\AppData\crypjMERAky\activation.exe
C:\Users\username\AppData\infozam.exe
C:\Users\username\AppData\ujgmedia\2d634303ca9312a24bab137928b72fa.exe
C:\Users\username\AppData\vghost\vghost.exe
C:\Users\username\AppData\wnwcrz\buwctr.exe
C:\Windows\Dapp\Dapp.exe
C:\Windows\Temp\mccew.exe
C:\Windows\cocyama\cocyama.exe
C:\Windows\fix\cocyama.exe
C:\Windows\live session\winenit.exe
C:\Windows\system\need.exe
C:\Windows\syswow64\config\systemprofile\appdata\roaming\micsrosoft\security\mcrservice.exe
C:\Windows\winsrc.exe

Trending

Most Viewed

Loading...