Analysis
-
max time kernel
1169s -
max time network
1171s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19-01-2022 12:35
Static task
static1
Behavioral task
behavioral1
Sample
b628fc267d7a45f2fc59e9f9ae9a7b26.exe
Resource
win10-en-20211208
General
-
Target
b628fc267d7a45f2fc59e9f9ae9a7b26.exe
-
Size
352KB
-
MD5
b628fc267d7a45f2fc59e9f9ae9a7b26
-
SHA1
b6eae181f7969b2e1e1b35d5878ff73eba7be16a
-
SHA256
5bcc4adc07ee34b43752fb0fb97b1ab8291e0a840f77ff0895a49965cf3638c2
-
SHA512
5e86bea42863fd06255fe7ce4e847ea07d3f4e7fa267f8e2fe2844637dc9facc81b4b675c17152d95abb16936f00caa3e08f982ad8e317708e6018086e5f3b78
Malware Config
Extracted
asyncrat
1.0.7
Old Torrents
null:null
DcRatMutex_VFSVDSDVSDVS
-
anti_vm
false
-
bsod
false
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/CSbtWBfW
Extracted
smokeloader
2020
http://greenco2020.top/
http://greenco2021.top/
http://greenco2022.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
b628fc267d7a45f2fc59e9f9ae9a7b26.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\WindowsSettingsDrive\\rjfggfsedfew.exe\"," b628fc267d7a45f2fc59e9f9ae9a7b26.exe -
Registers COM server for autorun 1 TTPs
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
avDump.exedescription pid process target process PID 4732 created 4148 4732 avDump.exe aswidsagent.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1416-256-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 4 IoCs
Processes:
mshta.exeflow pid process 516 5084 mshta.exe 517 5084 mshta.exe 519 5084 mshta.exe 521 5084 mshta.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 64 IoCs
Processes:
instup.exedescription ioc process File opened for modification C:\Windows\system32\drivers\avgbidsha.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgArPot.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgVmm.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw3e506b70d22039c2.tmp instup.exe File created C:\Windows\system32\drivers\asw6940411656dc975b.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw8aabd99833123679.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw20fcbd7ccda235b6.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgMonFlt.sys instup.exe File opened for modification C:\Windows\system32\drivers\aswb177b504330be913.tmp instup.exe File created C:\Windows\system32\drivers\aswfcc644a018359748.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw6809ecdd0eaadba0.tmp instup.exe File created C:\Windows\system32\drivers\asweab5012fc3befa2f.tmp instup.exe File created C:\Windows\system32\drivers\asw3e506b70d22039c2.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsdrivera.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgRvrt.sys instup.exe File created C:\Windows\system32\drivers\asw6809ecdd0eaadba0.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw19bba96bcd3cad7a.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgFsBlk.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgKbd.sys instup.exe File created C:\Windows\system32\drivers\aswba5a4dc6e96c4cb5.tmp instup.exe File opened for modification C:\Windows\system32\drivers\aswba5a4dc6e96c4cb5.tmp instup.exe File created C:\Windows\system32\drivers\asw638386751e1c97ad.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw638386751e1c97ad.tmp instup.exe File created C:\Windows\system32\drivers\avgElam.sys instup.exe File opened for modification C:\Windows\system32\drivers\aswa5a085695d28401e.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbdiskx.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgSP.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgStm.sys instup.exe File created C:\Windows\system32\drivers\avgRdr2.sys instup.exe File created C:\Windows\system32\drivers\avgbidsh.sys instup.exe File created C:\Windows\system32\drivers\asw19bba96bcd3cad7a.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgSnx.sys instup.exe File created C:\Windows\system32\drivers\avgbidsdriver.sys instup.exe File created C:\Windows\system32\drivers\avgKbd.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw6940411656dc975b.tmp instup.exe File created C:\Windows\system32\drivers\asw0ff4ab45ef29a8cd.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsdriverx.sys instup.exe File created C:\Windows\system32\drivers\avgArDisk.sys instup.exe File created C:\Windows\system32\drivers\asw8a433c6975eb400a.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgblogx.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsdriver.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsh.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw0ff4ab45ef29a8cd.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbuniva.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgNet.sys instup.exe File created C:\Windows\system32\drivers\aswa5a085695d28401e.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbidshx.sys instup.exe File created C:\Windows\system32\drivers\avgNetHub.sys instup.exe File created C:\Windows\system32\drivers\avgMonFlt.sys instup.exe File created C:\Windows\system32\drivers\avgRvrt.sys instup.exe File opened for modification C:\Windows\system32\drivers\aswfcc644a018359748.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asweab5012fc3befa2f.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbunivx.sys instup.exe File created C:\Windows\system32\drivers\avgArPot.sys instup.exe File created C:\Windows\system32\drivers\asw8aabd99833123679.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbloga.sys instup.exe File created C:\Windows\system32\drivers\avgSP.sys instup.exe File created C:\Windows\system32\drivers\avgbuniv.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw8a433c6975eb400a.tmp instup.exe File created C:\Windows\system32\drivers\asweb5d19613c2ed92f.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgNetHub.sys instup.exe File created C:\Windows\system32\drivers\aswb177b504330be913.tmp instup.exe File created C:\Windows\system32\drivers\asw20fcbd7ccda235b6.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgRdr2.sys instup.exe -
Executes dropped EXE 52 IoCs
Processes:
RegAsm.exeBdvwcopjyancviqfmold-torrent - group - botnet.exeghdecjhActivate__Full__Setup.exeFile1.exeIntelRapid.exeavg_antivirus_free_setup.exeavg_antivirus_free_setup_x64.exeinstup.exeinstup.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exesbr.exeSetupInf.exeSetupInf.exeSetupInf.exeSetupInf.exeSetupInf.exeAvEmUpdate.exeAvEmUpdate.exeavBugReport.exeavBugReport.exeRegSvr.exeRegSvr.exeRegSvr.exeRegSvr.exeoverseer.exeengsup.exewsc_proxy.exewsc_proxy.exeengsup.exeSupportTool.exesched.exeaswidsagent.exeavDump.exeAvDump.exeAvDump.exegaming_hook.exefirefox_pass.exeDriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exeghdecjhamigo.setup.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 1416 RegAsm.exe 1200 Bdvwcopjyancviqfmold-torrent - group - botnet.exe 2340 ghdecjh 2824 Activate__Full__Setup.exe 848 File1.exe 1672 IntelRapid.exe 3276 avg_antivirus_free_setup.exe 1720 avg_antivirus_free_setup_x64.exe 1276 instup.exe 3952 instup.exe 1940 aswOfferTool.exe 3932 aswOfferTool.exe 916 aswOfferTool.exe 4092 aswOfferTool.exe 984 aswOfferTool.exe 1048 aswOfferTool.exe 2928 aswOfferTool.exe 3592 aswOfferTool.exe 980 sbr.exe 3148 SetupInf.exe 2036 SetupInf.exe 1220 SetupInf.exe 2516 SetupInf.exe 3728 SetupInf.exe 2328 AvEmUpdate.exe 2592 AvEmUpdate.exe 1044 avBugReport.exe 1784 avBugReport.exe 1320 RegSvr.exe 3756 RegSvr.exe 864 RegSvr.exe 3548 RegSvr.exe 2756 overseer.exe 3584 engsup.exe 348 wsc_proxy.exe 2020 wsc_proxy.exe 2756 engsup.exe 748 SupportTool.exe 684 sched.exe 4148 aswidsagent.exe 4732 avDump.exe 4284 AvDump.exe 1924 AvDump.exe 4244 gaming_hook.exe 2112 firefox_pass.exe 2360 DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe 4184 ghdecjh 1496 amigo.setup.exe 4980 software_reporter_tool.exe 4688 software_reporter_tool.exe 4944 software_reporter_tool.exe 4196 software_reporter_tool.exe -
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
IntelRapid.exeActivate__Full__Setup.exeFile1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Activate__Full__Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Activate__Full__Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion File1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion File1.exe -
Deletes itself 1 IoCs
Processes:
powershell.exepid process 2760 powershell.exe -
Drops startup file 1 IoCs
Processes:
File1.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk File1.exe -
Loads dropped DLL 23 IoCs
Processes:
Bdvwcopjyancviqfmold-torrent - group - botnet.exeghdecjhavg_antivirus_free_setup.exeinstup.exeinstup.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeDriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exeghdecjhsoftware_reporter_tool.exepid process 1200 Bdvwcopjyancviqfmold-torrent - group - botnet.exe 2340 ghdecjh 3276 avg_antivirus_free_setup.exe 1276 instup.exe 1276 instup.exe 1276 instup.exe 1276 instup.exe 3952 instup.exe 916 aswOfferTool.exe 984 aswOfferTool.exe 2928 aswOfferTool.exe 3592 aswOfferTool.exe 2360 DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe 4184 ghdecjh 2360 DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe 2360 DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe 4944 software_reporter_tool.exe 4944 software_reporter_tool.exe 4944 software_reporter_tool.exe 4944 software_reporter_tool.exe 4944 software_reporter_tool.exe 4944 software_reporter_tool.exe 4944 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Desktop\Activate__Full__Setup\Activate__Full__Setup.exe themida behavioral1/memory/2824-858-0x00000000010C0000-0x0000000001771000-memory.dmp themida behavioral1/memory/2824-859-0x00000000010C0000-0x0000000001771000-memory.dmp themida behavioral1/memory/848-860-0x00007FF79E240000-0x00007FF79EBB1000-memory.dmp themida behavioral1/memory/848-861-0x00007FF79E240000-0x00007FF79EBB1000-memory.dmp themida behavioral1/memory/848-862-0x00007FF79E240000-0x00007FF79EBB1000-memory.dmp themida behavioral1/memory/1672-872-0x00007FF62FF20000-0x00007FF630891000-memory.dmp themida behavioral1/memory/1672-873-0x00007FF62FF20000-0x00007FF630891000-memory.dmp themida behavioral1/memory/1672-874-0x00007FF62FF20000-0x00007FF630891000-memory.dmp themida -
Processes:
instup.exewsc_proxy.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av instup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\SECURITY CENTER\PROVIDER\AV\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} wsc_proxy.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\SECURITY CENTER\PROVIDER\AV\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} wsc_proxy.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
instup.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\AvRepair = "\"C:\\Program Files\\AVG\\Antivirus\\setup\\instup.exe\" /instop:repair /wait" instup.exe -
Checks for any installed AV software in registry 1 TTPs 23 IoCs
Processes:
aswidsagent.exeavg_antivirus_free_setup_x64.exeinstup.exeinstup.exeSetupInf.exeAvEmUpdate.exeRegSvr.exewsc_proxy.exeSupportTool.exeSetupInf.exeSetupInf.exeAvEmUpdate.exeRegSvr.exeengsup.exeengsup.exesched.exeSetupInf.exeSetupInf.exeRegSvr.exeRegSvr.exewsc_proxy.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast aswidsagent.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast AvEmUpdate.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast wsc_proxy.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast SupportTool.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast AvEmUpdate.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast engsup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast engsup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast sched.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast wsc_proxy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Activate__Full__Setup.exeFile1.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Activate__Full__Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA File1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 22 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
instup.exeSetupInf.exeSupportTool.exeavg_antivirus_free_setup_x64.exeinstup.exeRegSvr.exeavBugReport.exewsc_proxy.exeaswidsagent.exeSetupInf.exeSetupInf.exeSetupInf.exeAvEmUpdate.exeRegSvr.exeRegSvr.exeavg_antivirus_free_setup.exeSetupInf.exeavBugReport.exeRegSvr.exeoverseer.exewsc_proxy.exedescription ioc process File opened for modification \??\PhysicalDrive0 instup.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 SupportTool.exe File opened for modification \??\PhysicalDrive0 avg_antivirus_free_setup_x64.exe File opened for modification \??\PhysicalDrive0 instup.exe File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 avBugReport.exe File opened for modification \??\PhysicalDrive0 wsc_proxy.exe File opened for modification \??\PhysicalDrive0 aswidsagent.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 AvEmUpdate.exe File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 File opened for modification \??\PhysicalDrive0 avg_antivirus_free_setup.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 avBugReport.exe File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 overseer.exe File opened for modification \??\PhysicalDrive0 wsc_proxy.exe -
Drops file in System32 directory 2 IoCs
Processes:
instup.exedescription ioc process File created C:\Windows\system32\asw76e108cf4f985032.tmp instup.exe File opened for modification C:\Windows\system32\asw76e108cf4f985032.tmp instup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Activate__Full__Setup.exeFile1.exeIntelRapid.exepid process 2824 Activate__Full__Setup.exe 848 File1.exe 1672 IntelRapid.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b628fc267d7a45f2fc59e9f9ae9a7b26.exedescription pid process target process PID 2648 set thread context of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe -
Drops file in Program Files directory 64 IoCs
Processes:
instup.exeDriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exeAvEmUpdate.exedescription ioc process File opened for modification C:\Program Files\AVG\Antivirus\aswAv.dll.sum instup.exe File created C:\Program Files (x86)\DriverPack\img\assistant-chat\sound.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File created C:\Program Files (x86)\DriverPack\img\installation\controls\pause.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File created C:\Program Files (x86)\DriverPack\img\screens\icon-driver-row-collapse.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File created C:\Program Files\AVG\Antivirus\avg.local_vc142.crt\asw953db016c9908a3e.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\22011807\db_elfa.sig.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\aswRemoteCache.dll instup.exe File created C:\Program Files\AVG\Antivirus\Licenses\asw6c9f3bb542334a57.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\22011807\db_conb.dat.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\AvDump.exe instup.exe File opened for modification C:\Program Files\AVG\Antivirus\aswidpsdkx.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\22011807\aswb1ab63cb2a31b784.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\BrowserCleanup.ini instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\22011807\db_mx95.sig instup.exe File opened for modification C:\Program Files\AVG\Antivirus\avg.local_vc142.crt\api-ms-win-crt-heap-l1-1-0.dll instup.exe File created C:\Program Files (x86)\DriverPack\css\fonts\Open-Sans\opensans-regular-webfont.ttf DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\Licenses\aswba3975f35143decf.tmp instup.exe File created C:\Program Files\AVG\Antivirus\x86\asw8ddd3e1976545e22.tmp instup.exe File created C:\Program Files\AVG\Antivirus\setup\Inf\x64\asw21b64affb1252600.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\Licenses\bzip2.txt.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\AhResStd.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\1033\avg.local_vc142.crt\asw135129d670ae41d9.tmp instup.exe File created C:\Program Files (x86)\DriverPack\css\fonts\DRPicons\DRPicons-webfont.woff DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File created C:\Program Files (x86)\DriverPack\img\start-loader.gif DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\asw7640a2f9f332430d.tmp instup.exe File created C:\Program Files\AVG\Antivirus\aswccc495b58793ec15.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\nos.dll instup.exe File created C:\Program Files (x86)\DriverPack\img\installation\banner_auth-bg.jpg DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File created C:\Program Files (x86)\DriverPack\languages\de.js DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\avg.local_vc142.crt\api-ms-win-core-processthreads-l1-1-1.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\api-ms-win-core-file-l1-1-0.dll.sum instup.exe File created C:\Program Files (x86)\DriverPack\img\onboarding-new\reboot.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\vaarclient.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\vps_win64-*.vpx instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\22011807\db_evope.dat instup.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\settings-c8f.ori instup.exe File opened for modification C:\Program Files\AVG\Antivirus\1033\avg.local_vc142.crt\aswc1e54c3422babc14.tmp instup.exe File created C:\Program Files (x86)\DriverPack\img\info.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\vps_binaries_64-98.vpx instup.exe File opened for modification C:\Program Files\AVG\Antivirus\aswa45c330cb1d61a17.tmp instup.exe File created C:\Program Files (x86)\DriverPack\img\onboarding-new\many-browsers.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\22011807\db_swf.sig instup.exe File opened for modification C:\Program Files\AVG\Antivirus\libcrypto-1_1.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\redist instup.exe File created C:\Program Files (x86)\DriverPack\img\screens\globe_hover.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\RescueDisk\background.png instup.exe File opened for modification C:\Program Files\AVG\Antivirus\event_manager.dll instup.exe File created C:\Program Files\AVG\Antivirus\avg.local_vc142.crt\aswde127a414da1792a.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\avg.local_vc142.crt\aswa94461b775d5aa99.tmp instup.exe File created C:\Program Files\AVG\Antivirus\setup\Inf\x64\asw14f52da2e24d31c9.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\Licenses\c-ares.txt.sum instup.exe File created C:\Program Files (x86)\DriverPack\img\screens\menu-protect.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File created C:\Program Files (x86)\DriverPack\languages\ar.js DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File created C:\Program Files\AVG\Antivirus\defs\22011807\asw7c1a05b69bb23faa.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\22011807\aswbefd2cb52eaa4533.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\Setup\9f33ab9b-612f-41a3-8f2c-9a2c125d91d2\update.xml AvEmUpdate.exe File created C:\Program Files\AVG\Antivirus\defs\22011807\asw0da971c7294cb22e.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\libssl-1_1.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\aswSecDns.dll instup.exe File created C:\Program Files (x86)\DriverPack\img\screens\configurator-btn-icon.png DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe File opened for modification C:\Program Files\AVG\Antivirus\aswec5f82f82f92f136.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\msvcp140_2.dll.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\Licenses\cef.txt instup.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\CRT instup.exe -
Drops file in Windows directory 9 IoCs
Processes:
taskmgr.exeinstup.exeWerFault.exetaskmgr.exetaskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\97717462.pri taskmgr.exe File opened for modification C:\Windows\ELAMBKUP\aswfcee0d225d325bdb.tmp instup.exe File created C:\Windows\ELAMBKUP\aswfcee0d225d325bdb.tmp instup.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\rescache\_merged\4183903823\97717462.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\1361672858.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\1361672858.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\97717462.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\1361672858.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3548 5084 WerFault.exe mshta.exe -
Checks SCSI registry key(s) 3 TTPs 24 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Bdvwcopjyancviqfmold-torrent - group - botnet.exeghdecjhtaskmgr.exeinstup.exetaskmgr.exeghdecjhtaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Bdvwcopjyancviqfmold-torrent - group - botnet.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdecjh Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 instup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags instup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 instup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdecjh Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdecjh Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdecjh Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Bdvwcopjyancviqfmold-torrent - group - botnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdecjh Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdecjh Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Bdvwcopjyancviqfmold-torrent - group - botnet.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags instup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service instup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service instup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegSvr.exeRegSvr.exeaswidsagent.exeSetupInf.exeinstup.exeSetupInf.exeSetupInf.exeSetupInf.exeAvEmUpdate.exeRegSvr.exewsc_proxy.exeActivate__Full__Setup.exeAvEmUpdate.exeRegSvr.exeengsup.exeSetupInf.exeavBugReport.exewsc_proxy.exeavg_antivirus_free_setup_x64.exeavBugReport.exeinstup.exeengsup.exesched.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature aswidsagent.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 AvEmUpdate.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 RegSvr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Activate__Full__Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SetupInf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 AvEmUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision engsup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision SetupInf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegSvr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aswidsagent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz avBugReport.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature AvEmUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 avBugReport.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 avBugReport.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision wsc_proxy.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SetupInf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 RegSvr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 aswidsagent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz avBugReport.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 engsup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature engsup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature sched.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1908 timeout.exe -
Enumerates system info in registry 2 TTPs 17 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exeinstup.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\Bios instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosReleaseDate instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
RegSvr.exeRegSvr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extension Validation\{3C5422B3-D1E2-449E-A736-809C934C2F80} RegSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Validation\{3C5422B3-D1E2-449E-A736-809C934C2F80} RegSvr.exe -
Modifies registry class 64 IoCs
Processes:
instup.exeinstup.exeRegSvr.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "85" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\avgthemefile\EditFlags = "65536" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB904E4E-D2C7-4C8D-8492-B620BB9896B1}\ = "AVG IAntimalwareProvider implementation" RegSvr.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).top = "54" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "75" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Uninstalling kernel driver: avguniv" instup.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1\0\0\0\0\0 = 74003100000000003354e76510004156474c4f437e312e4352540000580009000400efbe3354e1653354e7652e00000084af01000000050000000000000000000000000000007ae5d8006100760067002e006c006f00630061006c005f00760063003100340032002e0063007200740000001c000000 Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "30" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "80" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File extracted: prod-vps.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Windows\\system32\\drivers\\avgbidshx.sys" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\AVG instup.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "32" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "38" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: ais_dll_eng_x64-85b.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: db_o7.nmp" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: aswavdetection.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: instup.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\Aavm4h.dll" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\avglicfile\shell\open\command instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB904E4E-D2C7-4C8D-8492-B620BB9896B1} RegSvr.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).y = "4294967295" Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: db_el.dat" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: api-ms-win-core-datetime-l1-1-0.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: api-ms-win-core-file-l1-2-0.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: aswChLic.exe" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\RescueDisk\\Base.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\ring_client.dll" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "52" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\gaming_probe.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\Morphisec\\MorphiDriver.sys" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\FwReboot.txt" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\vps_win32-*.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\ais_gen_openssl-*.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\avglicfile\shell\open\command\ = "\"C:\\Program Files\\AVG\\Antivirus\\aswChLic.exe\" \"%1\"" instup.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: ais_cmp_swhealth_x64" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: vcruntime140.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: ntp_time.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: sched.exe" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\aswWebRepIE.dll" instup.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: ais_gen_tools-8a3.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: db_sl.nmp" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: AVGSvc.exe" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\part-iex-*.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Uninstalling kernel driver: avgHwid" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Registering avgKbd as a filter driver" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: part-prg_ais-150b0c8f.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File extracted: prod-pgm.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: db_w6.sig" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: hns_tools.dll" instup.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: api-ms-win-crt-environment-l1-1-0.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\avgsoundsfile\ = "AVG soundpack file" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "25" instup.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1\0\0\MRUListEx = 00000000ffffffff -
Suspicious behavior: AddClipboardFormatListener 7 IoCs
Processes:
IntelRapid.exepid process 3040 3040 1672 IntelRapid.exe 3040 3040 3040 3040 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exetaskmgr.exeb628fc267d7a45f2fc59e9f9ae9a7b26.exepowershell.exeBdvwcopjyancviqfmold-torrent - group - botnet.exepowershell.exepid process 2588 powershell.exe 2588 powershell.exe 2220 taskmgr.exe 2220 taskmgr.exe 2588 powershell.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe 2760 powershell.exe 2220 taskmgr.exe 2220 taskmgr.exe 1200 Bdvwcopjyancviqfmold-torrent - group - botnet.exe 1200 Bdvwcopjyancviqfmold-torrent - group - botnet.exe 1420 powershell.exe 2760 powershell.exe 1420 powershell.exe 2220 taskmgr.exe 2220 taskmgr.exe 2760 powershell.exe 2220 taskmgr.exe 1420 powershell.exe 2220 taskmgr.exe 2220 taskmgr.exe 3040 3040 3040 3040 3040 3040 3040 3040 2220 taskmgr.exe 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
taskmgr.exe7zG.exetaskmgr.exepid process 3040 2220 taskmgr.exe 708 7zG.exe 4476 taskmgr.exe -
Suspicious behavior: LoadsDriver 14 IoCs
Processes:
pid process 608 608 608 608 608 608 608 608 608 608 608 608 608 608 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
Bdvwcopjyancviqfmold-torrent - group - botnet.exeghdecjhghdecjhpid process 1200 Bdvwcopjyancviqfmold-torrent - group - botnet.exe 2340 ghdecjh 4184 ghdecjh -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 43 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exepid process 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 3252 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exetaskmgr.exeb628fc267d7a45f2fc59e9f9ae9a7b26.exepowershell.exepowershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 2220 taskmgr.exe Token: SeSystemProfilePrivilege 2220 taskmgr.exe Token: SeCreateGlobalPrivilege 2220 taskmgr.exe Token: SeDebugPrivilege 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 1420 powershell.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 1416 RegAsm.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe 2220 taskmgr.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
Processes:
instup.exeinstup.exeSupportTool.exeOpenWith.exepid process 3040 3040 3040 3040 3040 3040 3040 3040 1276 instup.exe 3952 instup.exe 3952 instup.exe 3040 3040 748 SupportTool.exe 748 SupportTool.exe 748 SupportTool.exe 3040 3040 4104 OpenWith.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b628fc267d7a45f2fc59e9f9ae9a7b26.exeWScript.exeWScript.exechrome.exedescription pid process target process PID 2648 wrote to memory of 2588 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe powershell.exe PID 2648 wrote to memory of 2588 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe powershell.exe PID 2648 wrote to memory of 2588 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe powershell.exe PID 2648 wrote to memory of 3872 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe WScript.exe PID 2648 wrote to memory of 3872 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe WScript.exe PID 2648 wrote to memory of 3872 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe WScript.exe PID 2648 wrote to memory of 2700 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe WScript.exe PID 2648 wrote to memory of 2700 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe WScript.exe PID 2648 wrote to memory of 2700 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe WScript.exe PID 2648 wrote to memory of 2760 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe powershell.exe PID 2648 wrote to memory of 2760 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe powershell.exe PID 2648 wrote to memory of 2760 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe powershell.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 3872 wrote to memory of 1420 3872 WScript.exe powershell.exe PID 3872 wrote to memory of 1420 3872 WScript.exe powershell.exe PID 3872 wrote to memory of 1420 3872 WScript.exe powershell.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 2648 wrote to memory of 1416 2648 b628fc267d7a45f2fc59e9f9ae9a7b26.exe RegAsm.exe PID 2700 wrote to memory of 1200 2700 WScript.exe Bdvwcopjyancviqfmold-torrent - group - botnet.exe PID 2700 wrote to memory of 1200 2700 WScript.exe Bdvwcopjyancviqfmold-torrent - group - botnet.exe PID 2700 wrote to memory of 1200 2700 WScript.exe Bdvwcopjyancviqfmold-torrent - group - botnet.exe PID 3040 wrote to memory of 3252 3040 chrome.exe PID 3040 wrote to memory of 3252 3040 chrome.exe PID 3252 wrote to memory of 2244 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 2244 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe PID 3252 wrote to memory of 1852 3252 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b628fc267d7a45f2fc59e9f9ae9a7b26.exe"C:\Users\Admin\AppData\Local\Temp\b628fc267d7a45f2fc59e9f9ae9a7b26.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Xsvtgsafoxuevumbywzd.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath 'C:\','C:\Users\Admin\AppData\Roaming\WindowsSettingsDrive\rjfggfsedfew.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Nwinnbsokj.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Bdvwcopjyancviqfmold-torrent - group - botnet.exe"C:\Users\Admin\AppData\Local\Temp\Bdvwcopjyancviqfmold-torrent - group - botnet.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\b628fc267d7a45f2fc59e9f9ae9a7b26.exe" -Force2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb379f4f50,0x7ffb379f4f60,0x7ffb379f4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1496 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1824 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4500 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4624 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4768 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4824 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4852 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4532 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4796 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5140 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4532 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5244 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3800 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5304 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4792 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4828 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5020 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2732 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1996 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1992 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5540 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4948 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3588 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5732 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3520 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5852 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2632 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2464 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2456 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1412 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1424 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5268 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=164 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1432 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,17635872891575794380,8994597690649718773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5644 /prefetch:82⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Activate__Full__Setup\" -ad -an -ai#7zMap17988:104:7zEvent29801⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Roaming\ghdecjhC:\Users\Admin\AppData\Roaming\ghdecjh1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Users\Admin\Desktop\Activate__Full__Setup\Activate__Full__Setup.exe"C:\Users\Admin\Desktop\Activate__Full__Setup\Activate__Full__Setup.exe"1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\File1.exe"C:\Users\Admin\AppData\Local\Temp\File1.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 3 & del /f /q "C:\Users\Admin\Desktop\Activate__Full__Setup\Activate__Full__Setup.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb379f4f50,0x7ffb379f4f60,0x7ffb379f4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1512 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1896 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2352 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2668 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4008 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4168 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4484 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4632 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3240 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4836 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8364311934849627725,10792747070000969139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2008 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb379f4f50,0x7ffb379f4f60,0x7ffb379f4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2032 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2652 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2084 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4972 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5208 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4912 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2964 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2996 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2988 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2952 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2016,283153520152649051,9536899365055845100,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5944 /prefetch:82⤵
-
C:\Users\Admin\Downloads\avg_antivirus_free_setup.exe"C:\Users\Admin\Downloads\avg_antivirus_free_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
-
C:\Windows\Temp\asw.701a63e024ee7288\avg_antivirus_free_setup_x64.exe"C:\Windows\Temp\asw.701a63e024ee7288\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_012_999_a6a_m /ga_clientid:0a4741e1-1bd3-4097-8c96-bb0f0127dd80 /edat_dir:C:\Windows\Temp\asw.701a63e024ee72883⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\instup.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.f81ea8f0a210e6ca /edition:15 /prod:ais /guid:79f6ee60-f1af-492b-a098-96a087698707 /ga_clientid:0a4741e1-1bd3-4097-8c96-bb0f0127dd80 /cookie:mmm_bav_012_999_a6a_m /ga_clientid:0a4741e1-1bd3-4097-8c96-bb0f0127dd80 /edat_dir:C:\Windows\Temp\asw.701a63e024ee72884⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\instup.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.f81ea8f0a210e6ca /edition:15 /prod:ais /guid:79f6ee60-f1af-492b-a098-96a087698707 /ga_clientid:0a4741e1-1bd3-4097-8c96-bb0f0127dd80 /cookie:mmm_bav_012_999_a6a_m /edat_dir:C:\Windows\Temp\asw.701a63e024ee7288 /online_installer5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe" -checkGToolbar -elevated6⤵
- Executes dropped EXE
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe" /check_secure_browser6⤵
- Executes dropped EXE
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe" -checkChrome -elevated6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC6⤵
- Executes dropped EXE
-
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC6⤵
- Executes dropped EXE
-
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\aswOfferTool.exe" -checkChrome -elevated6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\sbr.exe"C:\Windows\Temp\asw.f81ea8f0a210e6ca\New_150b0c8f\sbr.exe" 3952 "AVG Antivirus setup" "AVG Antivirus is being installed. Do not shut down your computer!"6⤵
- Executes dropped EXE
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgRdr2.cat6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgHwid.cat6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgVmm.cat6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgRvrt.cat6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /elaminst C:\Windows\system32\drivers\avgElam.sys6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\AvEmUpdate.exe"C:\Program Files\AVG\Antivirus\AvEmUpdate.exe" /installer /reg6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\AvEmUpdate.exe"C:\Program Files\AVG\Antivirus\AvEmUpdate.exe" /installer16⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\avBugReport.exe"C:\Program Files\AVG\Antivirus\avBugReport.exe" --send "dumps|report" --silent --path "C:\ProgramData\AVG\Antivirus" --guid 79f6ee60-f1af-492b-a098-96a0876987077⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\avBugReport.exe"C:\Program Files\AVG\Antivirus\avBugReport.exe" --send dumps|report --silent --keep --contentfilter "chrome-extension://gomekmidlodglbbmalcneegieacbdmki" --product 129 --programpath "C:\Program Files\AVG\Antivirus" --logpath "C:\ProgramData\AVG\Antivirus\log" --path "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports" --guid 79f6ee60-f1af-492b-a098-96a0876987077⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\x86\RegSvr.exe"C:\Program Files\AVG\Antivirus\x86\RegSvr.exe" "C:\Program Files\AVG\Antivirus\x86\aswAMSI.dll"6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies Internet Explorer settings
-
C:\Program Files\AVG\Antivirus\RegSvr.exe"C:\Program Files\AVG\Antivirus\RegSvr.exe" "C:\Program Files\AVG\Antivirus\aswAMSI.dll"6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\AVG\Antivirus\x86\RegSvr.exe"C:\Program Files\AVG\Antivirus\x86\RegSvr.exe" "C:\Program Files\AVG\Antivirus\x86\asOutExt.dll"6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\RegSvr.exe"C:\Program Files\AVG\Antivirus\RegSvr.exe" "C:\Program Files\AVG\Antivirus\asOutExt.dll"6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\Common Files\AVG\Overseer\overseer.exe"C:\Program Files\Common Files\AVG\Overseer\overseer.exe" /skip_uptime /skip_remediations6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Program Files\AVG\Antivirus\defs\22011807\engsup.exe"C:\Program Files\AVG\Antivirus\defs\22011807\engsup.exe" /prepare_definitions_folder6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\wsc_proxy.exe"C:\Program Files\AVG\Antivirus\wsc_proxy.exe" /svc /register /ppl_svc6⤵
- Executes dropped EXE
- Windows security modification
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\defs\22011807\engsup.exe"C:\Program Files\AVG\Antivirus\defs\22011807\engsup.exe" /avg /get_latest_ga_client_id /get_latest_landingpageid_cookie /get_latest_pagedownloadid_cookie6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\wsc_proxy.exe"C:\Program Files\AVG\Antivirus\wsc_proxy.exe" /runassvc /rpcserver1⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Program Files\AVG\Antivirus\SupportTool.exe"C:\Program Files\AVG\Antivirus\SupportTool.exe"1⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\AVG\Antivirus\sched.exe"C:\Program Files\AVG\Antivirus\sched.exe"1⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\aswidsagent.exe"C:\Program Files\AVG\Antivirus\aswidsagent.exe"1⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\avDump.exe"C:\Program Files\AVG\Antivirus\avDump.exe" --pid 4148 --exception_ptr 000000A4D6AFE540 --thread_id 4748 --dump_level 0 --handle_data 1 --dump_file "C:\ProgramData\AVG\Antivirus\log\unp309363703812248651x-manual.mdmp" --comment "Cause: VectoredExceptionHandler - Cause: A few RegisterWaitForSingleObject handles unregistered" --min_interval 602⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
-
C:\Program Files\AVG\Antivirus\x86\AvDump.exe"C:\Program Files\AVG\Antivirus\x86\AvDump.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\AVG\Antivirus\x86\AvDump.exe"C:\Program Files\AVG\Antivirus\x86\AvDump.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\AVG\Antivirus\x86\gaming_hook.exe"C:\Program Files\AVG\Antivirus\x86\gaming_hook.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\AVG\Antivirus\x86\firefox_pass.exe"C:\Program Files\AVG\Antivirus\x86\firefox_pass.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb379f4f50,0x7ffb379f4f60,0x7ffb379f4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1668 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2344 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2332 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1552 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4480 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4660 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4796 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2372 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3496 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3492 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3484 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6016 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1536,5317034710982238265,14056700350383616513,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6092 /prefetch:82⤵
-
C:\Users\Admin\Downloads\DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe"C:\Users\Admin\Downloads\DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\DriverPack\start.bat" "DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe""3⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\DriverPack\run.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} --sfx "DriverPack-17-Online_981825240.1642596551__kk5viujub8fogy8.exe"4⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 22525⤵
- Drops file in Windows directory
- Program crash
-
C:\Users\Admin\AppData\Roaming\ghdecjhC:\Users\Admin\AppData\Roaming\ghdecjh1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb379f4f50,0x7ffb379f4f60,0x7ffb379f4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1580 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1928 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2444 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2412 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4536 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4672 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4756 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4540 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4856 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3804 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
-
C:\Users\Admin\Downloads\amigo.setup.exe"C:\Users\Admin\Downloads\amigo.setup.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5648 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5052 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3132 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3152 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3272 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\96.276.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\96.276.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=wacj/SyziiwR6Vc+dtMzngVAwcmxbTQOgAy2Fo+1 --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=Off2⤵
- Executes dropped EXE
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\96.276.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\96.276.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=96.276.200 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff7ba4ff510,0x7ff7ba4ff520,0x7ff7ba4ff5303⤵
- Executes dropped EXE
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\96.276.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\96.276.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_4980_AIHWDAVLSQMAIRWN" --sandboxed-process-id=2 --init-done-notifier=728 --sandbox-mojo-pipe-token=3578449925237654263 --mojo-platform-channel-handle=704 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\96.276.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\96.276.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_4980_AIHWDAVLSQMAIRWN" --sandboxed-process-id=3 --init-done-notifier=912 --sandbox-mojo-pipe-token=17052972377939257035 --mojo-platform-channel-handle=9163⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1396 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5724 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2196 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1556,7079655917189523341,4361118042584491296,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
66382a4ca6c4dcf75ce41417d44be93e
SHA18132cbef1c12f8a89a68a6153ade4286bf130812
SHA256a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56
SHA5122bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
5f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
223cd0f2c703916dc33653c437c44102
SHA16f586404fb4035247eae468523ed46cb003ee432
SHA256ab9487c6f42992c92d1f8fd025da165bf2dd62aed4674db721d86c6adbc6a128
SHA512fa30800757cd12a0c7a676dc7a991768b394958ad0abebc84ef58516aaf011602bd5526e59db35f38376a92b75166c3dcc12328f18c10064e9020728b83d6f7d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
bbd2005f766fb64aa721a1bd53b267e1
SHA11c2782f54332940b0585a95ac28b7ec6d935b910
SHA256fa7922d15ef8738a94a079a0280fcf07e5e21d2287341f1fc769523781fe1be3
SHA512fb73861d6bdc56e042588195545414dca14587c16a5e3d77fe12403f3c93db1d2c2ef02499f9ffdaf2157637681e99265dae703c24a1e09179d53117f941a4a7
-
C:\Users\Admin\AppData\Local\Temp\Bdvwcopjyancviqfmold-torrent - group - botnet.exeMD5
cbb2b46e3870007c8f2cfb0c631fb785
SHA1c0e8b3c81706203e49f09395f819fd638de179f1
SHA2563ba4fb6da9c575d278032a3670fe3161045d25254e05cefbbe262820e3f05541
SHA512e7f31d4f6e6fd34e01bd11c3962be28dd4f2a997c87b564bf20bacf394c87d0974ff725c3b74f6bff420af74d1bfd7c9472cf390a28e4de9deb3fbce8431839c
-
C:\Users\Admin\AppData\Local\Temp\Bdvwcopjyancviqfmold-torrent - group - botnet.exeMD5
cbb2b46e3870007c8f2cfb0c631fb785
SHA1c0e8b3c81706203e49f09395f819fd638de179f1
SHA2563ba4fb6da9c575d278032a3670fe3161045d25254e05cefbbe262820e3f05541
SHA512e7f31d4f6e6fd34e01bd11c3962be28dd4f2a997c87b564bf20bacf394c87d0974ff725c3b74f6bff420af74d1bfd7c9472cf390a28e4de9deb3fbce8431839c
-
C:\Users\Admin\AppData\Local\Temp\Nwinnbsokj.vbsMD5
22dacb14aede3fec000b8b186a57ebbe
SHA1d26ae41efc7d9dff09936c4b63bd8eca22f10190
SHA256dff6cd3f5222e493471e97b480317f86c0d6b325c0cc18af23cb7412093ca557
SHA512ecc1d420925ac55204499177129bc107937b720d8dc7c07aa834e0076cbbfa647fb28332b6345882b297f8a0648a34f4f8694bb701fa7051471003445070144e
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeMD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeMD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
C:\Users\Admin\AppData\Local\Temp\Xsvtgsafoxuevumbywzd.vbsMD5
f4b8d2a6a3320e08965fbb541db5f404
SHA1a996868c58ea876feee16124c3fccd1a5ed0a5e6
SHA256d04f6e57b9c899705a6f4dec3e2329b28450e24fdcf0b587c2507d4bbc81637b
SHA5125e4d144b13ad59857e968d4795be0544db9f9bd8fb48978a6562ab0c3b3b4788110de6db6cda3deb5a5040a70cb3eefff02a836912bd48a296571ca52ad12029
-
C:\Users\Admin\AppData\Roaming\ghdecjhMD5
cbb2b46e3870007c8f2cfb0c631fb785
SHA1c0e8b3c81706203e49f09395f819fd638de179f1
SHA2563ba4fb6da9c575d278032a3670fe3161045d25254e05cefbbe262820e3f05541
SHA512e7f31d4f6e6fd34e01bd11c3962be28dd4f2a997c87b564bf20bacf394c87d0974ff725c3b74f6bff420af74d1bfd7c9472cf390a28e4de9deb3fbce8431839c
-
C:\Users\Admin\AppData\Roaming\ghdecjhMD5
cbb2b46e3870007c8f2cfb0c631fb785
SHA1c0e8b3c81706203e49f09395f819fd638de179f1
SHA2563ba4fb6da9c575d278032a3670fe3161045d25254e05cefbbe262820e3f05541
SHA512e7f31d4f6e6fd34e01bd11c3962be28dd4f2a997c87b564bf20bacf394c87d0974ff725c3b74f6bff420af74d1bfd7c9472cf390a28e4de9deb3fbce8431839c
-
C:\Users\Admin\Desktop\Activate__Full__Setup\Activate__Full__Setup.exeMD5
1e07343c234d91c56b9dd6618fe2707e
SHA1f6d0f9b4543897d9cc5fa6cf98003b74cdf5c237
SHA25632d3346ff0178589981d808bfd950b5867e6245bd659d27341269af83785bd6e
SHA512a8ecc970e83fada0bff522321376987e28224f57782deabb69c986be6f7caa9c0f9e7c85d6350ac7236f1a7c6b2e1d44230f9a92a59770793c5b2fb3df52de9b
-
C:\Users\Admin\Desktop\Activate__Full__Setup\Pasword is ___4695.txtMD5
6270afa97a1eb44b696eef53f8b70b0c
SHA1f9241c4d9f23e279f693cd83c1a3c6237a0bd301
SHA256380e250f018a55d1cdb152eda2dde48e56e20247ca23427accdcc1988e2060cd
SHA51266340915a2eb2516ff6b2a988aa3c8ce0c26f4282e542478b1ccfa120a40bf1b1f865a3f5165ba11228b0e384c72b51ea606f3eb834c15dff692ee81a0065454
-
C:\Users\Admin\Downloads\Activate__Full__Setup.rarMD5
0e042d2277198e864f5e8c918122d5cc
SHA1a89924a9050990ac3b96d1a17f39b0f61bd92f36
SHA256526e32917d02c12c3dce30cf0e4c6d01242a8019ce5712d92d7e2310ccd8f819
SHA512c702e7eba4585b5a149cc99d1c1d4edb2d35b4d0dbcafb11f4aed05c37230cf0ef2df39847c3a6e28a52e6ca2c31dfa55bbd80604ef8c0a355e040098057cb8c
-
\??\pipe\crashpad_3252_YTSPYXISGNGOIBZKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\D8E6.tmpMD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
memory/848-861-0x00007FF79E240000-0x00007FF79EBB1000-memory.dmpFilesize
9.4MB
-
memory/848-862-0x00007FF79E240000-0x00007FF79EBB1000-memory.dmpFilesize
9.4MB
-
memory/848-860-0x00007FF79E240000-0x00007FF79EBB1000-memory.dmpFilesize
9.4MB
-
memory/1200-280-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1416-287-0x0000000005350000-0x0000000005351000-memory.dmpFilesize
4KB
-
memory/1416-256-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1420-284-0x0000000006CE0000-0x0000000006CE1000-memory.dmpFilesize
4KB
-
memory/1420-298-0x00000000095A0000-0x0000000009645000-memory.dmpFilesize
660KB
-
memory/1420-509-0x00000000079A0000-0x00000000079A8000-memory.dmpFilesize
32KB
-
memory/1420-504-0x0000000007E10000-0x0000000007E2A000-memory.dmpFilesize
104KB
-
memory/1420-299-0x0000000006CE3000-0x0000000006CE4000-memory.dmpFilesize
4KB
-
memory/1420-293-0x000000007E850000-0x000000007E851000-memory.dmpFilesize
4KB
-
memory/1420-292-0x0000000008590000-0x00000000085AE000-memory.dmpFilesize
120KB
-
memory/1420-291-0x00000000085B0000-0x00000000085E3000-memory.dmpFilesize
204KB
-
memory/1420-286-0x0000000006CE2000-0x0000000006CE3000-memory.dmpFilesize
4KB
-
memory/1672-872-0x00007FF62FF20000-0x00007FF630891000-memory.dmpFilesize
9.4MB
-
memory/1672-873-0x00007FF62FF20000-0x00007FF630891000-memory.dmpFilesize
9.4MB
-
memory/1672-874-0x00007FF62FF20000-0x00007FF630891000-memory.dmpFilesize
9.4MB
-
memory/2340-789-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2588-170-0x0000000009F60000-0x000000000A5D8000-memory.dmpFilesize
6.5MB
-
memory/2588-241-0x0000000005010000-0x00000000071F0000-memory.dmpFilesize
33.9MB
-
memory/2588-122-0x00000000076C0000-0x00000000076E2000-memory.dmpFilesize
136KB
-
memory/2588-132-0x0000000008780000-0x00000000087F6000-memory.dmpFilesize
472KB
-
memory/2588-126-0x0000000007710000-0x000000000772C000-memory.dmpFilesize
112KB
-
memory/2588-171-0x0000000009520000-0x000000000953A000-memory.dmpFilesize
104KB
-
memory/2588-127-0x0000000007E70000-0x0000000007EBB000-memory.dmpFilesize
300KB
-
memory/2588-123-0x0000000007760000-0x00000000077C6000-memory.dmpFilesize
408KB
-
memory/2588-121-0x0000000005010000-0x00000000071F0000-memory.dmpFilesize
33.9MB
-
memory/2588-120-0x0000000005010000-0x00000000071F0000-memory.dmpFilesize
33.9MB
-
memory/2588-124-0x0000000008030000-0x0000000008096000-memory.dmpFilesize
408KB
-
memory/2588-125-0x00000000080A0000-0x00000000083F0000-memory.dmpFilesize
3.3MB
-
memory/2588-119-0x0000000007820000-0x0000000007E48000-memory.dmpFilesize
6.2MB
-
memory/2588-118-0x0000000004F30000-0x0000000004F66000-memory.dmpFilesize
216KB
-
memory/2648-245-0x0000000005E60000-0x0000000005E61000-memory.dmpFilesize
4KB
-
memory/2648-246-0x0000000006570000-0x0000000006A6E000-memory.dmpFilesize
5.0MB
-
memory/2648-243-0x00000000054D0000-0x000000000552C000-memory.dmpFilesize
368KB
-
memory/2648-244-0x0000000005D20000-0x0000000005DB2000-memory.dmpFilesize
584KB
-
memory/2648-115-0x0000000000C20000-0x0000000000C7E000-memory.dmpFilesize
376KB
-
memory/2760-283-0x00000000046D0000-0x00000000046D1000-memory.dmpFilesize
4KB
-
memory/2760-304-0x0000000009480000-0x0000000009514000-memory.dmpFilesize
592KB
-
memory/2760-285-0x00000000046D2000-0x00000000046D3000-memory.dmpFilesize
4KB
-
memory/2760-305-0x0000000008480000-0x00000000084A2000-memory.dmpFilesize
136KB
-
memory/2760-265-0x00000000079E0000-0x0000000007D30000-memory.dmpFilesize
3.3MB
-
memory/2760-268-0x0000000008430000-0x000000000847B000-memory.dmpFilesize
300KB
-
memory/2824-859-0x00000000010C0000-0x0000000001771000-memory.dmpFilesize
6.7MB
-
memory/2824-858-0x00000000010C0000-0x0000000001771000-memory.dmpFilesize
6.7MB
-
memory/2824-857-0x0000000076F00000-0x000000007708E000-memory.dmpFilesize
1.6MB
-
memory/3040-288-0x00000000075E0000-0x00000000075F5000-memory.dmpFilesize
84KB
-
memory/3040-804-0x0000000000E20000-0x0000000000E35000-memory.dmpFilesize
84KB
-
memory/3040-12073-0x00000000010B0000-0x00000000010C5000-memory.dmpFilesize
84KB
-
memory/4184-12072-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4944-12289-0x00007FFB41A90000-0x00007FFB41A91000-memory.dmpFilesize
4KB
-
memory/4944-12290-0x00007FFB42660000-0x00007FFB42661000-memory.dmpFilesize
4KB