Analysis
-
max time kernel
586s -
max time network
599s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-02-2021 09:44
Static task
static1
URLScan task
urlscan1
Sample
https://crackheap.net/
Behavioral task
behavioral1
Sample
https://crackheap.net/
Resource
win10v20201028
Behavioral task
behavioral2
Sample
https://crackheap.net/
Resource
win10v20201028
Behavioral task
behavioral3
Sample
https://crackheap.net/
Resource
win10v20201028
General
-
Target
https://crackheap.net/
-
Sample
210215-fe9bcqlt6e
Malware Config
Extracted
raccoon
8a5ae6012868ca42851ee67a7adea59c46a3fb6d
-
url4cnc
https://telete.in/jdiavolenok23
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral3/memory/724-755-0x0000000000400000-0x000000000042C000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exefile.exe9E3B.tmp.exe9E79.tmp.exe9F17.tmp.exe9FC3.tmp.exe9E3B.tmp.exeSetup.exeBC863AABC388D491.exeBC863AABC388D491.exemd2_2efs.exe1613382707622.exe1613382709934.exe9F17.tmp.exeBTRSetp.exeThunderFW.exe5507165.60710892.75634628.615478168.60gdrrr.exeWindows Host.exejfiag3g_gg.exejfiag3g_gg.exekeygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exefile.exe695.tmp.exe85B.tmp.exe88B.tmp.exeC80.tmp.exe695.tmp.exeGDIView.exeGDIView.exeSetup.exemd2_2efs.exekeygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exefile.exe46DA.tmp.exe47A6.tmp.exe47C6.tmp.exe4BFA.tmp.exeBTRSetp.exe46DA.tmp.exe3985730.438184457.908625543.94Setup.exe3015158.33gdrrr.exepid process 4680 keygen-pr.exe 4692 keygen-step-1.exe 4804 keygen-step-2.exe 4972 keygen-step-3.exe 4920 keygen-step-4.exe 4780 key.exe 2308 file.exe 4520 9E3B.tmp.exe 1296 9E79.tmp.exe 2196 9F17.tmp.exe 3888 9FC3.tmp.exe 4968 9E3B.tmp.exe 4196 Setup.exe 4212 BC863AABC388D491.exe 1064 BC863AABC388D491.exe 2428 md2_2efs.exe 4116 1613382707622.exe 4504 1613382709934.exe 724 9F17.tmp.exe 3348 BTRSetp.exe 1696 ThunderFW.exe 5116 5507165.60 4892 710892.7 5108 5634628.61 4432 5478168.60 3916 gdrrr.exe 4856 Windows Host.exe 5196 jfiag3g_gg.exe 5420 jfiag3g_gg.exe 5732 keygen-pr.exe 5740 keygen-step-1.exe 5768 keygen-step-2.exe 5800 keygen-step-3.exe 5808 keygen-step-4.exe 6136 key.exe 5136 file.exe 4640 695.tmp.exe 1516 85B.tmp.exe 804 88B.tmp.exe 3956 C80.tmp.exe 2252 695.tmp.exe 4560 GDIView.exe 5264 GDIView.exe 1156 Setup.exe 5096 md2_2efs.exe 5832 keygen-pr.exe 6128 keygen-step-1.exe 2912 keygen-step-2.exe 5012 keygen-step-3.exe 5412 keygen-step-4.exe 1920 key.exe 5444 file.exe 1252 46DA.tmp.exe 3152 47A6.tmp.exe 816 47C6.tmp.exe 5104 4BFA.tmp.exe 5504 BTRSetp.exe 5508 46DA.tmp.exe 508 3985730.43 2652 8184457.90 5560 8625543.94 5648 Setup.exe 5668 3015158.33 5888 gdrrr.exe -
Processes:
resource yara_rule behavioral3/memory/2056-685-0x0000000004670000-0x0000000004671000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3015158.332456459.265634628.615478168.60700068.77999659.873713941.403644473.407568639.838625543.94description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3015158.33 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3015158.33 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2456459.26 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5634628.61 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5478168.60 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 700068.7 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7999659.87 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3713941.40 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3644473.40 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7568639.83 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7568639.83 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3713941.40 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 700068.7 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5634628.61 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3644473.40 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8625543.94 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7999659.87 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2456459.26 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5478168.60 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8625543.94 -
Loads dropped DLL 29 IoCs
Processes:
9E79.tmp.exeMsiExec.exeMsiExec.exeC80.tmp.exeMsiExec.exe9BEF.tmp.exeMsiExec.exeMsiExec.exe823E.tmp.exepid process 1296 9E79.tmp.exe 1296 9E79.tmp.exe 1296 9E79.tmp.exe 1296 9E79.tmp.exe 1296 9E79.tmp.exe 1296 9E79.tmp.exe 2268 MsiExec.exe 4488 MsiExec.exe 3956 C80.tmp.exe 2872 MsiExec.exe 3956 C80.tmp.exe 3956 C80.tmp.exe 3956 C80.tmp.exe 3956 C80.tmp.exe 3956 C80.tmp.exe 1288 9BEF.tmp.exe 5720 MsiExec.exe 1288 9BEF.tmp.exe 1288 9BEF.tmp.exe 1288 9BEF.tmp.exe 1288 9BEF.tmp.exe 1288 9BEF.tmp.exe 4756 MsiExec.exe 5676 823E.tmp.exe 5676 823E.tmp.exe 5676 823E.tmp.exe 5676 823E.tmp.exe 5676 823E.tmp.exe 5676 823E.tmp.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral3/memory/5108-805-0x0000000000CA0000-0x0000000000CA1000-memory.dmp themida behavioral3/memory/4432-838-0x0000000000EF0000-0x0000000000EF1000-memory.dmp themida behavioral3/memory/5560-951-0x0000000000280000-0x0000000000281000-memory.dmp themida behavioral3/memory/5668-956-0x0000000000F70000-0x0000000000F71000-memory.dmp themida behavioral3/memory/4896-1198-0x0000000000960000-0x0000000000961000-memory.dmp themida behavioral3/memory/5392-1206-0x0000000001330000-0x0000000001331000-memory.dmp themida behavioral3/memory/4348-1240-0x0000000000C40000-0x0000000000C41000-memory.dmp themida behavioral3/memory/5488-1251-0x0000000000BD0000-0x0000000000BD1000-memory.dmp themida behavioral3/memory/5776-1360-0x0000000000B90000-0x0000000000B91000-memory.dmp themida behavioral3/memory/4704-1403-0x00000000001B0000-0x00000000001B1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gdrrr.exe710892.7description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gdrrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 710892.7 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
BC863AABC388D491.exemd2_2efs.exe7568639.835478168.60Setup.exe8625543.943015158.33Setup.exeSetup.exeSetup.exe2456459.26Setup.exemd2_2efs.exe5634628.61md2_2efs.exe7999659.873644473.403713941.40BC863AABC388D491.exemd2_2efs.exemd2_2efs.exe700068.7description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7568639.83 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5478168.60 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8625543.94 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3015158.33 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2456459.26 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5634628.61 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7999659.87 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3644473.40 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3713941.40 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 700068.7 -
Drops Chrome extension 1 IoCs
Processes:
BC863AABC388D491.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hbkhpidnlldpilcnmfclgkbpoknjheaj\1.0.0.0_0\manifest.json BC863AABC388D491.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Users\Admin\Desktop\desktop.ini msiexec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exemsiexec.exemsiexec.exemsiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 337 api.ipify.org 430 api.ipify.org 475 api.ipify.org 159 api.ipify.org 221 ip-api.com 276 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 7 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Setup.exeBC863AABC388D491.exeBC863AABC388D491.exeSetup.exeSetup.exeSetup.exeSetup.exedescription ioc process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 BC863AABC388D491.exe File opened for modification \??\PhysicalDrive0 BC863AABC388D491.exe File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
Setup.exe5634628.615478168.60Setup.exe8625543.943015158.33Setup.exeSetup.exe7999659.873644473.407568639.833713941.40Setup.exe700068.72456459.26pid process 4196 Setup.exe 5108 5634628.61 4432 5478168.60 1156 Setup.exe 5560 8625543.94 5668 3015158.33 5648 Setup.exe 2484 Setup.exe 4896 7999659.87 5392 3644473.40 4348 7568639.83 5488 3713941.40 96 Setup.exe 5776 700068.7 4704 2456459.26 -
Suspicious use of SetThreadContext 18 IoCs
Processes:
9E3B.tmp.exeBC863AABC388D491.exe9F17.tmp.exe695.tmp.exe46DA.tmp.exe85B.tmp.exekeygen-step-2.exe99FB.tmp.exe47A6.tmp.exe9B06.tmp.exekeygen-step-2.exekeygen-step-2.exe8106.tmp.exekeygen-step-2.exekeygen-step-2.exe8174.tmp.exe3468.tmp.exedescription pid process target process PID 4520 set thread context of 4968 4520 9E3B.tmp.exe 9E3B.tmp.exe PID 4212 set thread context of 4444 4212 BC863AABC388D491.exe firefox.exe PID 4212 set thread context of 4988 4212 BC863AABC388D491.exe firefox.exe PID 2196 set thread context of 724 2196 9F17.tmp.exe 9F17.tmp.exe PID 4640 set thread context of 2252 4640 695.tmp.exe 695.tmp.exe PID 1252 set thread context of 5508 1252 46DA.tmp.exe 46DA.tmp.exe PID 1516 set thread context of 4108 1516 85B.tmp.exe 85B.tmp.exe PID 4228 set thread context of 5276 4228 keygen-step-2.exe keygen-step-2.exe PID 4452 set thread context of 4512 4452 99FB.tmp.exe 99FB.tmp.exe PID 3152 set thread context of 5436 3152 47A6.tmp.exe 47A6.tmp.exe PID 3284 set thread context of 3708 3284 9B06.tmp.exe 9B06.tmp.exe PID 5600 set thread context of 616 5600 keygen-step-2.exe keygen-step-2.exe PID 616 set thread context of 5872 616 keygen-step-2.exe keygen-step-2.exe PID 6020 set thread context of 1432 6020 8106.tmp.exe 8106.tmp.exe PID 4484 set thread context of 5112 4484 keygen-step-2.exe keygen-step-2.exe PID 5112 set thread context of 3480 5112 keygen-step-2.exe keygen-step-2.exe PID 3504 set thread context of 2040 3504 8174.tmp.exe 8174.tmp.exe PID 356 set thread context of 5844 356 3468.tmp.exe 3468.tmp.exe -
Drops file in Program Files directory 15 IoCs
Processes:
msiexec.exemsiexec.exemsiexec.exemsiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File created C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File created C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe File created C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe File opened for modification C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe -
Drops file in Windows directory 16 IoCs
Processes:
msiexec.exeWerFault.exedescription ioc process File opened for modification C:\Windows\Installer\MSI5F66.tmp msiexec.exe File opened for modification C:\Windows\Installer\f782630.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f782630.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI279F.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{9A2A452C-3057-4F5E-8C7F-41B0D566B831} msiexec.exe File opened for modification C:\Windows\Installer\MSI9761.tmp msiexec.exe File created C:\Windows\Installer\f782633.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID728.tmp msiexec.exe File created C:\Windows\Installer\f782628.msi msiexec.exe File opened for modification C:\Windows\Installer\f782628.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\f78262a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE700.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2056 2428 WerFault.exe md2_2efs.exe 5400 5096 WerFault.exe md2_2efs.exe 5852 5276 WerFault.exe keygen-step-2.exe 1520 5376 WerFault.exe md2_2efs.exe 4508 5952 WerFault.exe md2_2efs.exe 4912 616 WerFault.exe keygen-step-2.exe 3180 3448 WerFault.exe md2_2efs.exe 4836 5112 WerFault.exe keygen-step-2.exe 6060 4384 WerFault.exe md2_2efs.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exeBC863AABC388D491.exeBC863AABC388D491.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
695.tmp.exe46DA.tmp.exe99FB.tmp.exekeygen-step-2.exe9E3B.tmp.exekeygen-step-2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 695.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 46DA.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 99FB.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 99FB.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 keygen-step-2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString keygen-step-2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9E3B.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9E3B.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 695.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 46DA.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 keygen-step-2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString keygen-step-2.exe -
Delays execution with timeout.exe 10 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 3808 timeout.exe 1836 timeout.exe 4872 timeout.exe 1332 timeout.exe 4944 timeout.exe 4980 timeout.exe 4016 timeout.exe 2208 timeout.exe 4528 timeout.exe 972 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4392 taskkill.exe -
Modifies data under HKEY_USERS 7 IoCs
Processes:
file.exesvchost.exefile.exefile.exefile.exefile.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe -
Modifies registry class 2 IoCs
Processes:
chrome.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msiexec.exe -
Processes:
file.exeSetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 file.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 0300000001000000140000006c0ce2dd0584c47cac18839f14055f19fa270cdd2000000001000000500500003082054c30820434a0030201020206016de34cff62300d06092a864886f70d01010b05003081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a301e170d3030303130313030303030305a170d3438313231353039313533375a3081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a30820122300d06092a864886f70d01010105000382010f003082010a0282010100ae86c5043ed34d99f44fa3052ea34047a7fbbe33188b1dc2ca645ca3249e85e54b4921d4998fda6a22247c32d9087d742af3bf850803ae8c1e25faad53fb8fd823b7353d9a3ac992bf917f693826c790e53a540b120b6553508ec9585e467d310bd3ef9fb61731deb522eb78f43f824b34be36782db7a8cb162cd22247b14e4c5ae633ed66542354a59971bddc59160ecdc521b4477c93ca9e624e0af00298602300f5dc368819c3cb9f02604636888276b3a498570473b5328b0834f327c34285e333da9207e12f0edbb654c8cf11e3cc7cba17a52cd7cd42c10ae095a2e4eb9d3e3f361488243f0584af40e72d6e6e182149bfb8342384f60f12e14734258d0203010001a382017430820170300f0603551d130101ff040530030101ff3082012c06096086480186f842010d0482011d138201195468697320526f6f74206365727469666963617465207761732067656e65726174656420627920436861726c65732050726f787920666f722053534c2050726f7879696e672e20496620746869732063657274696669636174652069732070617274206f66206120636572746966696361746520636861696e2c2074686973206d65616e73207468617420796f752772652062726f7773696e67207468726f75676820436861726c65732050726f787920776974682053534c2050726f7879696e6720656e61626c656420666f72207468697320776562736974652e20506c656173652073656520687474703a2f2f636861726c657370726f78792e636f6d2f73736c20666f72206d6f726520696e666f726d6174696f6e2e300e0603551d0f0101ff040403020204301d0603551d0e04160414f8d0dc54367cf794020f8b92783a5d8a91251f9f300d06092a864886f70d01010b05000382010100662271eb9d5c744c88382de98ba37320e6312104d04273a92007a8670976d6530e6347d00bbded1319bb6754f36237596095922911e3661a70354f6ba0b797a76258be7adebb8c8dbeeed977760b80271d74b2444d92f6c1337a379b73545b251de5f8812b9625abbbfaedc15f8c6c374b9b26dd0fef035185f5899d8819e689dc6db5f0babbfd637c52b1bec80115b889faeed493d4112d744954ad3abe6607c41a4a2d657ba330ed131fa4e8c25bb28ee181dcef8da91c17bfd30a23c8eae81b152ed85ff938afc32b34ffdaffbdb72d9bb04067bfc87f579eba9637b165ea008ea7408bc8265f33c039bf60f506d245a6b53017afc8e161d70ed5b0d76576 Setup.exe -
Runs ping.exe 1 TTPs 26 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4600 PING.EXE 3000 PING.EXE 4176 PING.EXE 3388 PING.EXE 5328 PING.EXE 5368 PING.EXE 2820 PING.EXE 3372 PING.EXE 4876 PING.EXE 3320 PING.EXE 5228 PING.EXE 904 PING.EXE 6004 PING.EXE 4204 PING.EXE 3100 PING.EXE 5564 PING.EXE 5240 PING.EXE 2732 PING.EXE 4232 PING.EXE 5052 PING.EXE 5784 PING.EXE 4844 PING.EXE 4388 PING.EXE 4544 PING.EXE 4052 PING.EXE 5084 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exefile.exe9E3B.tmp.exe1613382707622.exeWerFault.exe1613382709934.exemsiexec.exechrome.exechrome.exechrome.exe9F17.tmp.exe5507165.60pid process 2780 chrome.exe 2780 chrome.exe 1192 chrome.exe 1192 chrome.exe 4644 chrome.exe 4644 chrome.exe 5084 chrome.exe 5084 chrome.exe 4852 chrome.exe 4852 chrome.exe 4244 chrome.exe 4244 chrome.exe 376 chrome.exe 376 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4892 chrome.exe 4892 chrome.exe 4820 chrome.exe 4820 chrome.exe 4244 chrome.exe 4244 chrome.exe 2308 file.exe 2308 file.exe 2308 file.exe 2308 file.exe 4968 9E3B.tmp.exe 4968 9E3B.tmp.exe 4116 1613382707622.exe 4116 1613382707622.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 4504 1613382709934.exe 4504 1613382709934.exe 4772 msiexec.exe 4772 msiexec.exe 2836 chrome.exe 2836 chrome.exe 2392 chrome.exe 2392 chrome.exe 5140 chrome.exe 5140 chrome.exe 724 9F17.tmp.exe 724 9F17.tmp.exe 724 9F17.tmp.exe 5116 5507165.60 5116 5507165.60 5116 5507165.60 -
Suspicious behavior: SetClipboardViewer 4 IoCs
Processes:
8184457.907058085.77672651.76683479.73pid process 2652 8184457.90 5828 7058085.77 4360 672651.7 6024 6683479.73 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
9F17.tmp.exefile.exemsiexec.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2196 9F17.tmp.exe Token: SeDebugPrivilege 2308 file.exe Token: SeShutdownPrivilege 3104 msiexec.exe Token: SeIncreaseQuotaPrivilege 3104 msiexec.exe Token: SeSecurityPrivilege 4772 msiexec.exe Token: SeCreateTokenPrivilege 3104 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3104 msiexec.exe Token: SeLockMemoryPrivilege 3104 msiexec.exe Token: SeIncreaseQuotaPrivilege 3104 msiexec.exe Token: SeMachineAccountPrivilege 3104 msiexec.exe Token: SeTcbPrivilege 3104 msiexec.exe Token: SeSecurityPrivilege 3104 msiexec.exe Token: SeTakeOwnershipPrivilege 3104 msiexec.exe Token: SeLoadDriverPrivilege 3104 msiexec.exe Token: SeSystemProfilePrivilege 3104 msiexec.exe Token: SeSystemtimePrivilege 3104 msiexec.exe Token: SeProfSingleProcessPrivilege 3104 msiexec.exe Token: SeIncBasePriorityPrivilege 3104 msiexec.exe Token: SeCreatePagefilePrivilege 3104 msiexec.exe Token: SeCreatePermanentPrivilege 3104 msiexec.exe Token: SeBackupPrivilege 3104 msiexec.exe Token: SeRestorePrivilege 3104 msiexec.exe Token: SeShutdownPrivilege 3104 msiexec.exe Token: SeDebugPrivilege 3104 msiexec.exe Token: SeAuditPrivilege 3104 msiexec.exe Token: SeSystemEnvironmentPrivilege 3104 msiexec.exe Token: SeChangeNotifyPrivilege 3104 msiexec.exe Token: SeRemoteShutdownPrivilege 3104 msiexec.exe Token: SeUndockPrivilege 3104 msiexec.exe Token: SeSyncAgentPrivilege 3104 msiexec.exe Token: SeEnableDelegationPrivilege 3104 msiexec.exe Token: SeManageVolumePrivilege 3104 msiexec.exe Token: SeImpersonatePrivilege 3104 msiexec.exe Token: SeCreateGlobalPrivilege 3104 msiexec.exe Token: SeCreateTokenPrivilege 3104 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3104 msiexec.exe Token: SeLockMemoryPrivilege 3104 msiexec.exe Token: SeIncreaseQuotaPrivilege 3104 msiexec.exe Token: SeMachineAccountPrivilege 3104 msiexec.exe Token: SeTcbPrivilege 3104 msiexec.exe Token: SeSecurityPrivilege 3104 msiexec.exe Token: SeTakeOwnershipPrivilege 3104 msiexec.exe Token: SeLoadDriverPrivilege 3104 msiexec.exe Token: SeSystemProfilePrivilege 3104 msiexec.exe Token: SeSystemtimePrivilege 3104 msiexec.exe Token: SeProfSingleProcessPrivilege 3104 msiexec.exe Token: SeIncBasePriorityPrivilege 3104 msiexec.exe Token: SeCreatePagefilePrivilege 3104 msiexec.exe Token: SeCreatePermanentPrivilege 3104 msiexec.exe Token: SeBackupPrivilege 3104 msiexec.exe Token: SeRestorePrivilege 3104 msiexec.exe Token: SeShutdownPrivilege 3104 msiexec.exe Token: SeDebugPrivilege 3104 msiexec.exe Token: SeAuditPrivilege 3104 msiexec.exe Token: SeSystemEnvironmentPrivilege 3104 msiexec.exe Token: SeChangeNotifyPrivilege 3104 msiexec.exe Token: SeRemoteShutdownPrivilege 3104 msiexec.exe Token: SeUndockPrivilege 3104 msiexec.exe Token: SeSyncAgentPrivilege 3104 msiexec.exe Token: SeEnableDelegationPrivilege 3104 msiexec.exe Token: SeManageVolumePrivilege 3104 msiexec.exe Token: SeImpersonatePrivilege 3104 msiexec.exe Token: SeCreateGlobalPrivilege 3104 msiexec.exe Token: SeCreateTokenPrivilege 3104 msiexec.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exemsiexec.exechrome.exemsiexec.exemsiexec.exemsiexec.exemsiexec.exepid process 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 3104 msiexec.exe 3104 msiexec.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 5304 msiexec.exe 2976 msiexec.exe 5304 msiexec.exe 2976 msiexec.exe 4652 msiexec.exe 4652 msiexec.exe 5188 msiexec.exe 5188 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1192 wrote to memory of 1256 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 1256 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 3764 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2780 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2780 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe PID 1192 wrote to memory of 2828 1192 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://crackheap.net/1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffe306b6e00,0x7ffe306b6e10,0x7ffe306b6e202⤵PID:1256
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1520 /prefetch:22⤵PID:3764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 /prefetch:82⤵PID:2828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2772 /prefetch:12⤵PID:2004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:12⤵PID:3464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:2076
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵PID:3800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4412 /prefetch:82⤵PID:4292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:4704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:4744
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵PID:4760
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff7e21c7740,0x7ff7e21c7750,0x7ff7e21c77603⤵PID:4828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:4860
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:4952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4456 /prefetch:82⤵PID:5004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:4328
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:4524
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:4496
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:4388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4500 /prefetch:82⤵PID:864
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:2252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6136 /prefetch:82⤵PID:4656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6260 /prefetch:82⤵PID:4716
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6400 /prefetch:82⤵PID:4756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:4848
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6680 /prefetch:82⤵PID:4896
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6672 /prefetch:82⤵PID:4828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6920 /prefetch:82⤵PID:4916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7044 /prefetch:82⤵PID:4992
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7140 /prefetch:12⤵PID:4528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7284 /prefetch:82⤵PID:4536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7164 /prefetch:82⤵PID:2272
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7432 /prefetch:82⤵PID:2268
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7440 /prefetch:82⤵PID:4668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7832 /prefetch:82⤵PID:4712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7984 /prefetch:82⤵PID:4852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8124 /prefetch:82⤵PID:4940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4360 /prefetch:82⤵PID:4692
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:4620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4044 /prefetch:82⤵PID:4600
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8200 /prefetch:82⤵PID:4484
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8092 /prefetch:82⤵PID:1764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7912 /prefetch:82⤵PID:4792
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7760 /prefetch:12⤵PID:4760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7736 /prefetch:82⤵PID:4980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7872 /prefetch:82⤵PID:4476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7484 /prefetch:82⤵PID:3704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4360 /prefetch:12⤵PID:4456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=768 /prefetch:82⤵PID:4560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:4684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:4836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1608 /prefetch:12⤵PID:804
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1372 /prefetch:12⤵PID:4868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:1516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3996 /prefetch:82⤵PID:4448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3764 /prefetch:82⤵PID:4820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:4592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7528 /prefetch:82⤵PID:4824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:1624
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4188 /prefetch:82⤵PID:3452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7388 /prefetch:82⤵PID:4180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4128 /prefetch:82⤵PID:4172
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4080 /prefetch:82⤵PID:4108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7408 /prefetch:82⤵PID:4152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8160 /prefetch:82⤵PID:3900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7268 /prefetch:12⤵PID:2428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:3892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=81 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7308 /prefetch:12⤵PID:4484
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 /prefetch:82⤵PID:4520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3040 /prefetch:82⤵PID:4704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 /prefetch:82⤵PID:4252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,9122809756248387481,18230266389580061821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3576 /prefetch:82⤵PID:4276
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\Temp2_Adobe_After_Effects_CS4_keygen.zip\Adobe_After_Effects_CS4_keygen.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_Adobe_After_Effects_CS4_keygen.zip\Adobe_After_Effects_CS4_keygen.exe"1⤵PID:4136
-
C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"1⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Roaming\9E79.tmp.exe"C:\Users\Admin\AppData\Roaming\9E79.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\9E79.tmp.exe"5⤵PID:304
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:3808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵PID:4300
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:864
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Users\Admin\AppData\Roaming\9E3B.tmp.exe"C:\Users\Admin\AppData\Roaming\9E3B.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4520 -
C:\Users\Admin\AppData\Roaming\9E3B.tmp.exe"C:\Users\Admin\AppData\Roaming\9E3B.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Users\Admin\AppData\Roaming\9F17.tmp.exe"C:\Users\Admin\AppData\Roaming\9F17.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Users\Admin\AppData\Roaming\9F17.tmp.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:724 -
C:\Users\Admin\AppData\Roaming\9FC3.tmp.exe"C:\Users\Admin\AppData\Roaming\9FC3.tmp.exe"5⤵
- Executes dropped EXE
PID:3888 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\9FC3.tmp.exe6⤵PID:4768
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:1332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:4608
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
PID:4196 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exeC:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe 0011 installp15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
PID:4212 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:4444
-
C:\Users\Admin\AppData\Roaming\1613382707622.exe"C:\Users\Admin\AppData\Roaming\1613382707622.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613382707622.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4116 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:4988
-
C:\Users\Admin\AppData\Roaming\1613382709934.exe"C:\Users\Admin\AppData\Roaming\1613382709934.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613382709934.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe"6⤵PID:5036
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exeC:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe 200 installp15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops Chrome extension
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
PID:1064 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2276
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:4392 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe"6⤵PID:4828
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:4232 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵PID:4908
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 27725⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:3348 -
C:\ProgramData\5507165.60"C:\ProgramData\5507165.60"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5116 -
C:\ProgramData\710892.7"C:\ProgramData\710892.7"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4892 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
- Executes dropped EXE
PID:4856 -
C:\ProgramData\5634628.61"C:\ProgramData\5634628.61"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5108 -
C:\ProgramData\5478168.60"C:\ProgramData\5478168.60"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:5196 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:5420
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B8189ADC07C4EAFA19A331BEC44D8654 C2⤵
- Loads dropped DLL
PID:2268 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:808
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 57EC384DCD0BA50CD7C91719F6FE852B C2⤵
- Loads dropped DLL
PID:4488 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 716A4400719E184729A9710CC8C55382 C2⤵
- Loads dropped DLL
PID:2872 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 214DCCE64574ED5AB91D939E5B077D1D C2⤵
- Loads dropped DLL
PID:5720 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3215B770E6D226A5ACB5CCB072840E8B C2⤵
- Loads dropped DLL
PID:4756 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6A32FB4C2D6FE1F419F114A3E4B3AB35 C2⤵PID:348
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1984
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe21156e00,0x7ffe21156e10,0x7ffe21156e202⤵PID:4468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1904 /prefetch:82⤵PID:3000
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1724 /prefetch:22⤵PID:2440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:12⤵PID:4960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:12⤵PID:4936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --lang=en-US --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --disable-gpu-compositing --lang=en-US --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:3784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:4764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5140 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,11957251890643140165,14333550029169239284,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:5288
-
C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"1⤵PID:5588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen.bat" "2⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:5732 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\key.exe"4⤵
- Executes dropped EXE
PID:6136 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX3\key.exe -txt -scanlocal -file:potato.dat5⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:5740 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
PID:5768 -
C:\Users\Admin\AppData\Roaming\C80.tmp.exe"C:\Users\Admin\AppData\Roaming\C80.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3956 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\C80.tmp.exe"5⤵PID:2648
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:4980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen-step-2.exe" >> NUL4⤵PID:3244
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:5800 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen-step-3.exe"4⤵PID:5192
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:5808 -
C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5136 -
C:\Users\Admin\AppData\Roaming\695.tmp.exe"C:\Users\Admin\AppData\Roaming\695.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4640 -
C:\Users\Admin\AppData\Roaming\695.tmp.exe"C:\Users\Admin\AppData\Roaming\695.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2252 -
C:\Users\Admin\AppData\Roaming\85B.tmp.exe"C:\Users\Admin\AppData\Roaming\85B.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1516 -
C:\Users\Admin\AppData\Roaming\85B.tmp.exe"{path}"6⤵PID:4108
-
C:\Users\Admin\AppData\Roaming\88B.tmp.exe"C:\Users\Admin\AppData\Roaming\88B.tmp.exe"5⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\88B.tmp.exe6⤵PID:1408
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:1836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"5⤵PID:4000
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1156 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5304 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"5⤵PID:4952
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 29325⤵
- Program crash
PID:5400 -
C:\Users\Admin\AppData\Local\Temp\RarSFX4\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:5504 -
C:\ProgramData\3985730.43"C:\ProgramData\3985730.43"5⤵
- Executes dropped EXE
PID:508 -
C:\ProgramData\8184457.90"C:\ProgramData\8184457.90"5⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:2652 -
C:\ProgramData\8625543.94"C:\ProgramData\8625543.94"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5560 -
C:\ProgramData\3015158.33"C:\ProgramData\3015158.33"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5668 -
C:\Users\Admin\AppData\Local\Temp\RarSFX4\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\gdrrr.exe"4⤵
- Executes dropped EXE
PID:5888 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:3776
-
C:\Program Files (x86)\gdiview\gdiview\GDIView.exe"C:\Program Files (x86)\gdiview\gdiview\GDIView.exe"1⤵
- Executes dropped EXE
PID:4560
-
C:\Program Files (x86)\gdiview\gdiview\GDIView.exe"C:\Program Files (x86)\gdiview\gdiview\GDIView.exe"1⤵
- Executes dropped EXE
PID:5264
-
C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"1⤵PID:652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen.bat" "2⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:5832 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\key.exe"4⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX6\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:6128 -
C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-3.exe"4⤵PID:5236
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5444 -
C:\Users\Admin\AppData\Roaming\46DA.tmp.exe"C:\Users\Admin\AppData\Roaming\46DA.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1252 -
C:\Users\Admin\AppData\Roaming\46DA.tmp.exe"C:\Users\Admin\AppData\Roaming\46DA.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5508 -
C:\Users\Admin\AppData\Roaming\47A6.tmp.exe"C:\Users\Admin\AppData\Roaming\47A6.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3152 -
C:\Users\Admin\AppData\Roaming\47A6.tmp.exe"{path}"6⤵PID:5436
-
C:\Users\Admin\AppData\Roaming\47C6.tmp.exe"C:\Users\Admin\AppData\Roaming\47C6.tmp.exe"5⤵
- Executes dropped EXE
PID:816 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\47C6.tmp.exe6⤵PID:5336
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX6\file.exe"5⤵PID:1884
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:904 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5648 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX6\Setup.exe"5⤵PID:5208
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\md2_2efs.exe"4⤵
- Checks whether UAC is enabled
PID:5376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5376 -s 47205⤵
- Program crash
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\BTRSetp.exe"4⤵PID:4304
-
C:\ProgramData\6940688.76"C:\ProgramData\6940688.76"5⤵PID:1580
-
C:\ProgramData\672651.7"C:\ProgramData\672651.7"5⤵
- Suspicious behavior: SetClipboardViewer
PID:4360 -
C:\ProgramData\7568639.83"C:\ProgramData\7568639.83"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4348 -
C:\ProgramData\3713941.40"C:\ProgramData\3713941.40"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5488 -
C:\Users\Admin\AppData\Local\Temp\RarSFX6\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\gdrrr.exe"4⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Roaming\4BFA.tmp.exe"C:\Users\Admin\AppData\Roaming\4BFA.tmp.exe"4⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-2.exe"4⤵PID:5308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-2.exe" >> NUL4⤵PID:2440
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4176
-
C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"1⤵PID:5380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen.bat" "2⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-2.exekeygen-step-2.exe3⤵
- Suspicious use of SetThreadContext
PID:4228 -
C:\Users\Admin\AppData\Roaming\9BEF.tmp.exe"C:\Users\Admin\AppData\Roaming\9BEF.tmp.exe"4⤵
- Loads dropped DLL
PID:1288 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\9BEF.tmp.exe"5⤵PID:4548
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-2.exe"4⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-2.exe"5⤵PID:5340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 5285⤵
- Program crash
PID:5852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-2.exe" >> NUL4⤵PID:5704
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-4.exekeygen-step-4.exe3⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\RarSFX8\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\file.exe"4⤵
- Modifies data under HKEY_USERS
PID:2356 -
C:\Users\Admin\AppData\Roaming\99FB.tmp.exe"C:\Users\Admin\AppData\Roaming\99FB.tmp.exe"5⤵
- Suspicious use of SetThreadContext
PID:4452 -
C:\Users\Admin\AppData\Roaming\99FB.tmp.exe"C:\Users\Admin\AppData\Roaming\99FB.tmp.exe"6⤵
- Checks processor information in registry
PID:4512 -
C:\Users\Admin\AppData\Roaming\9B45.tmp.exe"C:\Users\Admin\AppData\Roaming\9B45.tmp.exe"5⤵PID:3884
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\9B45.tmp.exe6⤵PID:1372
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4016 -
C:\Users\Admin\AppData\Roaming\9B06.tmp.exe"C:\Users\Admin\AppData\Roaming\9B06.tmp.exe"5⤵
- Suspicious use of SetThreadContext
PID:3284 -
C:\Users\Admin\AppData\Roaming\9B06.tmp.exe"{path}"6⤵PID:5384
-
C:\Users\Admin\AppData\Roaming\9B06.tmp.exe"{path}"6⤵PID:3708
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX8\file.exe"5⤵PID:6000
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5328 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe"4⤵
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2484 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4652 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe"5⤵PID:5152
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:5784 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\md2_2efs.exe"4⤵
- Checks whether UAC is enabled
PID:5952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5952 -s 26725⤵
- Program crash
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\BTRSetp.exe"4⤵PID:4268
-
C:\ProgramData\7558573.83"C:\ProgramData\7558573.83"5⤵PID:5464
-
C:\ProgramData\7058085.77"C:\ProgramData\7058085.77"5⤵
- Suspicious behavior: SetClipboardViewer
PID:5828 -
C:\ProgramData\7999659.87"C:\ProgramData\7999659.87"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4896 -
C:\ProgramData\3644473.40"C:\ProgramData\3644473.40"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5392 -
C:\Users\Admin\AppData\Local\Temp\RarSFX8\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\gdrrr.exe"4⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-3.exekeygen-step-3.exe3⤵PID:3324
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-3.exe"4⤵PID:2164
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:6004 -
C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-step-1.exekeygen-step-1.exe3⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\RarSFX7\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:200
-
C:\Users\Admin\AppData\Local\Temp\RarSFX8\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX8\key.exe"4⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\RarSFX8\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX8\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4712
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\b4d85cb810674819818da705d564dee7 /t 2988 /p 29841⤵PID:3768
-
C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"1⤵PID:2176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen.bat" "2⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-1.exekeygen-step-1.exe3⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exe"4⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exekeygen-step-2.exe3⤵
- Suspicious use of SetThreadContext
PID:5600 -
C:\Users\Admin\AppData\Roaming\823E.tmp.exe"C:\Users\Admin\AppData\Roaming\823E.tmp.exe"4⤵
- Loads dropped DLL
PID:5676 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\823E.tmp.exe"5⤵PID:1748
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe"4⤵
- Suspicious use of SetThreadContext
PID:616 -
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe"5⤵
- Checks processor information in registry
PID:5872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 616 -s 5245⤵
- Program crash
PID:4912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-2.exe" >> NUL4⤵PID:5500
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-3.exekeygen-step-3.exe3⤵PID:5372
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-3.exe"4⤵PID:5948
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\RarSFX9\keygen-step-4.exekeygen-step-4.exe3⤵PID:5620
-
C:\Users\Admin\AppData\Local\Temp\RarSFX10\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\file.exe"4⤵
- Modifies data under HKEY_USERS
PID:5572 -
C:\Users\Admin\AppData\Roaming\8106.tmp.exe"C:\Users\Admin\AppData\Roaming\8106.tmp.exe"5⤵
- Suspicious use of SetThreadContext
PID:6020 -
C:\Users\Admin\AppData\Roaming\8106.tmp.exe"C:\Users\Admin\AppData\Roaming\8106.tmp.exe"6⤵PID:1432
-
C:\Users\Admin\AppData\Roaming\8174.tmp.exe"C:\Users\Admin\AppData\Roaming\8174.tmp.exe"5⤵
- Suspicious use of SetThreadContext
PID:3504 -
C:\Users\Admin\AppData\Roaming\8174.tmp.exe"{path}"6⤵PID:1712
-
C:\Users\Admin\AppData\Roaming\8174.tmp.exe"{path}"6⤵PID:2040
-
C:\Users\Admin\AppData\Roaming\81C3.tmp.exe"C:\Users\Admin\AppData\Roaming\81C3.tmp.exe"5⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\81C3.tmp.exe6⤵PID:5956
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX10\file.exe"5⤵PID:3676
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5368 -
C:\Users\Admin\AppData\Local\Temp\RarSFX10\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\Setup.exe"4⤵
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:96 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5188 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX10\Setup.exe"5⤵PID:4260
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\RarSFX10\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\md2_2efs.exe"4⤵
- Checks whether UAC is enabled
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 27725⤵
- Program crash
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\RarSFX10\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\BTRSetp.exe"4⤵PID:5256
-
C:\ProgramData\6212691.68"C:\ProgramData\6212691.68"5⤵PID:5004
-
C:\ProgramData\6683479.73"C:\ProgramData\6683479.73"5⤵
- Suspicious behavior: SetClipboardViewer
PID:6024 -
C:\ProgramData\700068.7"C:\ProgramData\700068.7"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5776 -
C:\ProgramData\2456459.26"C:\ProgramData\2456459.26"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\RarSFX10\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX10\gdrrr.exe"4⤵PID:5716
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2780
-
C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"C:\Users\Admin\Desktop\Adobe_After_Effects_CS4_keygen.exe"1⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen.bat" "2⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\RarSFX12\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX12\key.exe"4⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\RarSFX12\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX12\key.exe -txt -scanlocal -file:potato.dat5⤵PID:6012
-
C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-1.exekeygen-step-1.exe3⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-2.exekeygen-step-2.exe3⤵
- Suspicious use of SetThreadContext
PID:4484 -
C:\Users\Admin\AppData\Roaming\2DE0.tmp.exe"C:\Users\Admin\AppData\Roaming\2DE0.tmp.exe"4⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-2.exe"4⤵
- Suspicious use of SetThreadContext
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-2.exe"5⤵
- Checks processor information in registry
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 5245⤵
- Program crash
PID:4836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-2.exe" >> NUL4⤵PID:5660
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-3.exekeygen-step-3.exe3⤵PID:4820
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-3.exe"4⤵PID:4764
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\RarSFX11\keygen-step-4.exekeygen-step-4.exe3⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\RarSFX13\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX13\file.exe"4⤵PID:4832
-
C:\Users\Admin\AppData\Roaming\3468.tmp.exe"C:\Users\Admin\AppData\Roaming\3468.tmp.exe"5⤵
- Suspicious use of SetThreadContext
PID:356 -
C:\Users\Admin\AppData\Roaming\3468.tmp.exe"C:\Users\Admin\AppData\Roaming\3468.tmp.exe"6⤵PID:5844
-
C:\Users\Admin\AppData\Roaming\3787.tmp.exe"C:\Users\Admin\AppData\Roaming\3787.tmp.exe"5⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\3787.tmp.exe6⤵PID:5176
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:972 -
C:\Users\Admin\AppData\Roaming\3776.tmp.exe"C:\Users\Admin\AppData\Roaming\3776.tmp.exe"5⤵PID:5928
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX13\file.exe"5⤵PID:4316
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX13\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX13\Setup.exe"4⤵PID:4364
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:3176
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX13\Setup.exe"5⤵PID:3640
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:5240 -
C:\Users\Admin\AppData\Local\Temp\RarSFX13\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX13\md2_2efs.exe"4⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 27245⤵
- Program crash
PID:6060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
73f6d0da60e501a81f81c6ecc348413a
SHA11445b5552db219dcf03e3cf95e1d8b51c1469a11
SHA2560dc4aa1ed41456c50da42d668c42c59cc9234b7ecb57bc30dfa5249aea460ca1
SHA5122cf98e8bd3faf877c094fb013fccebed4f8b99b41fa8d5eaf8f9838b8e940611ec6dede4171ea9e2b497fe4757427e77176e8de4de201e662ee0b628ec209a68
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e