Analysis
-
max time kernel
396s -
max time network
411s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2022 10:02
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10v2004-20220722-en
General
-
Target
sample.html
-
Size
540KB
-
MD5
558d9e65ebd71435611c1eaa956fc0af
-
SHA1
b0a96923dfbf4dcee4be681c666efb0550a0b5fc
-
SHA256
6edf58e55464a347de7f6aa1cee75198cf1d89f399665ca75ebbe891088761cf
-
SHA512
6dec3439b253940a58fc50c0064670feeb01a5f4d979c86fb8f9070d6b4ff7555341b9e9339342013c22c8c5fc68c97c111ac4c9bf0cc67b336b96f22a175e30
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
EpwZi3ETPnXZ.exelolicor.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ EpwZi3ETPnXZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lolicor.exe -
Executes dropped EXE 5 IoCs
Processes:
theruez.exedcpfromhorizon.exedcpfromhorizon.exelolicor.exeEpwZi3ETPnXZ.exepid process 4756 theruez.exe 8 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 4652 lolicor.exe 3036 EpwZi3ETPnXZ.exe -
Sets service image path in registry 2 TTPs 3 IoCs
Processes:
dcpfromhorizon.exedcpfromhorizon.exetheruez.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharpOD_Drv\ImagePath = "\\??\\C:\\Users\\Admin\\Desktop\\hdf\\x64\\plugins\\SharpOD_Drv.sys" dcpfromhorizon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharpOD_Drv\ImagePath = "\\??\\C:\\Users\\Admin\\Desktop\\hdf\\x64\\plugins\\SharpOD_Drv.sys" dcpfromhorizon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharpOD_Drv\ImagePath = "\\??\\C:\\Users\\Admin\\Desktop\\hdf\\x64\\plugins\\SharpOD_Drv.sys" theruez.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
lolicor.exeEpwZi3ETPnXZ.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lolicor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lolicor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EpwZi3ETPnXZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EpwZi3ETPnXZ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lolicor.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation lolicor.exe -
Loads dropped DLL 63 IoCs
Processes:
theruez.exedcpfromhorizon.exedcpfromhorizon.exex64dbg.exepid process 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3568 x64dbg.exe -
Processes:
resource yara_rule behavioral1/memory/4652-194-0x00007FF6ECD80000-0x00007FF6F02A9000-memory.dmp themida behavioral1/memory/4652-195-0x00007FF6ECD80000-0x00007FF6F02A9000-memory.dmp themida behavioral1/memory/4652-196-0x00007FF6ECD80000-0x00007FF6F02A9000-memory.dmp themida behavioral1/memory/4652-197-0x00007FF6ECD80000-0x00007FF6F02A9000-memory.dmp themida behavioral1/memory/4652-198-0x00007FF6ECD80000-0x00007FF6F02A9000-memory.dmp themida behavioral1/memory/4652-199-0x00007FF6ECD80000-0x00007FF6F02A9000-memory.dmp themida behavioral1/memory/4652-200-0x00007FF6ECD80000-0x00007FF6F02A9000-memory.dmp themida behavioral1/memory/3036-216-0x00007FF6586E0000-0x00007FF659398000-memory.dmp themida behavioral1/memory/3036-217-0x00007FF6586E0000-0x00007FF659398000-memory.dmp themida behavioral1/memory/3036-218-0x00007FF6586E0000-0x00007FF659398000-memory.dmp themida behavioral1/memory/3036-219-0x00007FF6586E0000-0x00007FF659398000-memory.dmp themida behavioral1/memory/3036-220-0x00007FF6586E0000-0x00007FF659398000-memory.dmp themida behavioral1/memory/3036-221-0x00007FF6586E0000-0x00007FF659398000-memory.dmp themida behavioral1/memory/3036-222-0x00007FF6586E0000-0x00007FF659398000-memory.dmp themida -
Processes:
lolicor.exeEpwZi3ETPnXZ.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lolicor.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EpwZi3ETPnXZ.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
EpwZi3ETPnXZ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\Desktop\Wallpaper = "C:\\zalupa.png" EpwZi3ETPnXZ.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 6 IoCs
Processes:
lolicor.exeEpwZi3ETPnXZ.exepid process 4652 lolicor.exe 4652 lolicor.exe 4652 lolicor.exe 3036 EpwZi3ETPnXZ.exe 3036 EpwZi3ETPnXZ.exe 3036 EpwZi3ETPnXZ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
lolicor.exeEpwZi3ETPnXZ.exepid process 4652 lolicor.exe 3036 EpwZi3ETPnXZ.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
x64dbg.exedescription pid process target process PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe PID 3568 set thread context of 3844 3568 x64dbg.exe SppExtComObj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4008 4756 WerFault.exe theruez.exe 2236 8 WerFault.exe dcpfromhorizon.exe 2064 3316 WerFault.exe dcpfromhorizon.exe 3712 3036 WerFault.exe EpwZi3ETPnXZ.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EEBEFA0D-125A-11ED-BE0E-F652DE9C8056} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EEBEFA0F-125A-11ED-BE0E-F652DE9C8056}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Modifies registry class 39 IoCs
Processes:
x64dbg.exechrome.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 x64dbg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Generic" x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\MRUListEx = 00000000ffffffff x64dbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\NodeSlot = "7" x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 x64dbg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 = 56003100000000000255c060100072656c6561736500400009000400efbe0255bd600255c0602e00000073310200000006000000000000000000000000000000893d9b00720065006c006500610073006500000016000000 x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 00000000ffffffff x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\MRUListEx = ffffffff x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" x64dbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 000000000200000001000000ffffffff x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 x64dbg.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} x64dbg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 = 4a003100000000000255c860300078363400380009000400efbe0255c0600255c8602e000000063202000000060000000000000000000000000000005e996f00780036003400000012000000 x64dbg.exe -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
Processes:
theruez.exedcpfromhorizon.exedcpfromhorizon.exex64dbg.exepid process 4756 theruez.exe 8 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3568 x64dbg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exetheruez.exedcpfromhorizon.exechrome.exedcpfromhorizon.exechrome.exechrome.exex64dbg.exepid process 3100 chrome.exe 3100 chrome.exe 1800 chrome.exe 1800 chrome.exe 852 chrome.exe 852 chrome.exe 4508 chrome.exe 4508 chrome.exe 2824 chrome.exe 2824 chrome.exe 4352 chrome.exe 4352 chrome.exe 4400 chrome.exe 4400 chrome.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 4756 theruez.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3592 chrome.exe 3592 chrome.exe 1732 chrome.exe 1732 chrome.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
7zFM.exetheruez.exedcpfromhorizon.exedcpfromhorizon.exex64dbg.exepid process 4232 7zFM.exe 4756 theruez.exe 8 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3568 x64dbg.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
theruez.exedcpfromhorizon.exedcpfromhorizon.exepid process 4756 theruez.exe 8 dcpfromhorizon.exe 3316 dcpfromhorizon.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 31 IoCs
Processes:
chrome.exepid process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zFM.exetheruez.exedcpfromhorizon.exedcpfromhorizon.exex64dbg.exeEpwZi3ETPnXZ.exedescription pid process Token: SeRestorePrivilege 4232 7zFM.exe Token: 35 4232 7zFM.exe Token: SeSecurityPrivilege 4232 7zFM.exe Token: SeLoadDriverPrivilege 4756 theruez.exe Token: SeLoadDriverPrivilege 8 dcpfromhorizon.exe Token: SeLoadDriverPrivilege 3316 dcpfromhorizon.exe Token: SeDebugPrivilege 3568 x64dbg.exe Token: SeShutdownPrivilege 3036 EpwZi3ETPnXZ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
iexplore.exechrome.exepid process 4120 iexplore.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of SendNotifyMessage 56 IoCs
Processes:
chrome.exepid process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEOpenWith.exetheruez.exedcpfromhorizon.exedcpfromhorizon.exex64dbg.exelolicor.exeEpwZi3ETPnXZ.exepid process 4120 iexplore.exe 4120 iexplore.exe 4688 IEXPLORE.EXE 4688 IEXPLORE.EXE 1356 OpenWith.exe 1356 OpenWith.exe 1356 OpenWith.exe 1356 OpenWith.exe 1356 OpenWith.exe 4756 theruez.exe 4756 theruez.exe 8 dcpfromhorizon.exe 8 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3316 dcpfromhorizon.exe 3568 x64dbg.exe 3568 x64dbg.exe 3568 x64dbg.exe 4652 lolicor.exe 3036 EpwZi3ETPnXZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid process target process PID 4120 wrote to memory of 4688 4120 iexplore.exe IEXPLORE.EXE PID 4120 wrote to memory of 4688 4120 iexplore.exe IEXPLORE.EXE PID 4120 wrote to memory of 4688 4120 iexplore.exe IEXPLORE.EXE PID 1800 wrote to memory of 4296 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 4296 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 2148 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 3100 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 3100 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe PID 1800 wrote to memory of 1520 1800 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3844
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4120 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4688
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb22b4f50,0x7fffb22b4f60,0x7fffb22b4f702⤵PID:4296
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1716 /prefetch:22⤵PID:2148
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:1520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:12⤵PID:2064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4352 /prefetch:82⤵PID:756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:3396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4220 /prefetch:82⤵PID:4940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:82⤵PID:4816
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:5116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:4124
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:4752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:3364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:5008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1500
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:600
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4816
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:2580
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 /prefetch:82⤵PID:5068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:1580
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 /prefetch:82⤵PID:2124
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 /prefetch:82⤵PID:744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:3760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6496 /prefetch:12⤵PID:668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4424
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:3808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:5060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:82⤵PID:2236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6540 /prefetch:82⤵PID:4648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1076 /prefetch:12⤵PID:3396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=892 /prefetch:12⤵PID:440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:4204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6836 /prefetch:12⤵PID:4240
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7008 /prefetch:12⤵PID:4208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6876 /prefetch:12⤵PID:5104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:4784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:4996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:1220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:12⤵PID:1928
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7116 /prefetch:12⤵PID:4208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1632
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:12⤵PID:2892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6828 /prefetch:82⤵PID:4024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7500 /prefetch:12⤵PID:4152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:12⤵PID:1544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,2625736206281525376,14528357623586906652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2320 /prefetch:82⤵PID:3540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:1408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb22b4f50,0x7fffb22b4f60,0x7fffb22b4f702⤵PID:3408
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5024
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1356
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\hdf.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
C:\Users\Admin\Desktop\hdf\x64\theruez.exe"C:\Users\Admin\Desktop\hdf\x64\theruez.exe"1⤵
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4756 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4756 -s 12442⤵
- Program crash
PID:4008
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 4756 -ip 47561⤵PID:4464
-
C:\Users\Admin\Desktop\hdf\x64\dcpfromhorizon.exe"C:\Users\Admin\Desktop\hdf\x64\dcpfromhorizon.exe"1⤵
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:8 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8 -s 10282⤵
- Program crash
PID:2236
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 8 -ip 81⤵PID:1540
-
C:\Users\Admin\Desktop\hdf\x64\dcpfromhorizon.exe"C:\Users\Admin\Desktop\hdf\x64\dcpfromhorizon.exe"1⤵
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3316 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3316 -s 9522⤵
- Program crash
PID:2064
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 492 -p 3316 -ip 33161⤵PID:3420
-
C:\Users\Admin\Desktop\release\x64\x64dbg.exe"C:\Users\Admin\Desktop\release\x64\x64dbg.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3568
-
C:\Users\Admin\Desktop\hdf\lolicor.exe"C:\Users\Admin\Desktop\hdf\lolicor.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Users\Admin\Desktop\hdf\EpwZi3ETPnXZ.exeEpwZi3ETPnXZ.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3036 -s 6563⤵
- Program crash
PID:3712 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\Desktop\hdf\lolicor.exe >> NUL2⤵PID:8
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 3036 -ip 30361⤵PID:1748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5113209cb8bd81cb19f8128fbefd10a88
SHA180cce582633cb18300a73f40f4c769ca918fc9d3
SHA25668f37931350dff5a64ff27f24fba23a7995452c5a3e8aa1e1d0903bc62e08db3
SHA51251d91a59834d66a0f23f65cd11f5f925cefd7c75af0d668c2b390699d9b126c39338558f34e60b5dbaac13b66e26bed57e1214e0081b69de38b4f8fccacaf3a8
-
Filesize
40B
MD5113209cb8bd81cb19f8128fbefd10a88
SHA180cce582633cb18300a73f40f4c769ca918fc9d3
SHA25668f37931350dff5a64ff27f24fba23a7995452c5a3e8aa1e1d0903bc62e08db3
SHA51251d91a59834d66a0f23f65cd11f5f925cefd7c75af0d668c2b390699d9b126c39338558f34e60b5dbaac13b66e26bed57e1214e0081b69de38b4f8fccacaf3a8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
70KB
MD54a493025fc04b42ad6fe094d6171e8cd
SHA110fce3f7c7858f51070285a0c112a2601336913a
SHA256b63354cf2bc3b7ffb5b679f78af7993d094561fd307f6ebc2a30c4db69f5b79d
SHA5122e692ab41bdc813f9fb19b4ab335a5233f0881f9ba779a2056481e6e6fc9f5a31697ae3dabd599997c4f8a3553c5b7bf66f017abd03e1f7b93708a580fc6056d
-
Filesize
70KB
MD54a493025fc04b42ad6fe094d6171e8cd
SHA110fce3f7c7858f51070285a0c112a2601336913a
SHA256b63354cf2bc3b7ffb5b679f78af7993d094561fd307f6ebc2a30c4db69f5b79d
SHA5122e692ab41bdc813f9fb19b4ab335a5233f0881f9ba779a2056481e6e6fc9f5a31697ae3dabd599997c4f8a3553c5b7bf66f017abd03e1f7b93708a580fc6056d
-
Filesize
644KB
MD5edef53778eaafe476ee523be5c2ab67f
SHA158c416508913045f99cdf559f31e71f88626f6de
SHA25692faedd18a29e1bd2dd27a1d805ea5aa3e73b954a625af45a74f49d49506d20f
SHA5127fc931c69aca6a09924c84f57a4a2bcf506859ab02f622d858e9e13d5917c5d3bdd475ba88f7a7e537bdae84ca3df9c3a7c56b2b0ca3c2d463bd7e9b905e2ef8
-
Filesize
940KB
MD5aeb29ccc27e16c4fd223a00189b44524
SHA145a6671c64f353c79c0060bdafea0ceb5ad889be
SHA256d28c7ab34842b6149609bd4e6b566ddab8b891f0d5062480a253ef20a6a2caaa
SHA5122ec4d768a07cfa19d7a30cbd1a94d97ba4f296194b9c725cef8e50a2078e9e593a460e4296e033a05b191dc863acf6879d50c2242e82fe00054ca1952628e006
-
Filesize
5.3MB
MD5183dc11bf970daadae2970b7c0875a52
SHA1ea9fb38a40c6f3c1552390926c684d640c399d3f
SHA256705828e4a7aa9bb9d8f1a0955b35e6a8c3793da5721112479b590fcaf48f3dee
SHA51234526a6b37b5c6f6876e37debbba3181d4c51547dbb6e36e996d6ea1a2ccd44a4f8866584fb2918c8fa75436e8dd4595c5bb8c1a97c97568ba9ef9f728994bfd
-
Filesize
5.3MB
MD5183dc11bf970daadae2970b7c0875a52
SHA1ea9fb38a40c6f3c1552390926c684d640c399d3f
SHA256705828e4a7aa9bb9d8f1a0955b35e6a8c3793da5721112479b590fcaf48f3dee
SHA51234526a6b37b5c6f6876e37debbba3181d4c51547dbb6e36e996d6ea1a2ccd44a4f8866584fb2918c8fa75436e8dd4595c5bb8c1a97c97568ba9ef9f728994bfd
-
Filesize
5.7MB
MD5e7f02bdecf76f34ddff6d59504fb127a
SHA154e3f51ab39030e16c7b37c7e90f24919b99b123
SHA25669b8c2d955bf206238ed8bbc89746904c1c32eb10e111443eec98e2ef67a336f
SHA512de265fc971c151d1af0f7d78a3b7082a6dc4ec56ef35436ef50793a8a685e5e7f3788d4143a50bcfe10db36958dc9e0adfc4189c88dfa7a9528b0ea68a771de1
-
Filesize
5.7MB
MD5e7f02bdecf76f34ddff6d59504fb127a
SHA154e3f51ab39030e16c7b37c7e90f24919b99b123
SHA25669b8c2d955bf206238ed8bbc89746904c1c32eb10e111443eec98e2ef67a336f
SHA512de265fc971c151d1af0f7d78a3b7082a6dc4ec56ef35436ef50793a8a685e5e7f3788d4143a50bcfe10db36958dc9e0adfc4189c88dfa7a9528b0ea68a771de1
-
Filesize
1.0MB
MD560cc37b83981c03e96c2acea51f8ae13
SHA1d10fa3db0cef3bee143e817b3e315bba90f32f4a
SHA2562a79db2d1dfa9b98af33fbf9edc0617534584f1dd6c822c830f7d90972657add
SHA512a64d0e85943be7e77abcde2628b6654e09389c35ae998b9ded42078f193df8ef42d545aaaebd4fe3237ed8893f6c51cafef36adedab2d8d1528b8a6ea67c0ac0
-
Filesize
1.0MB
MD560cc37b83981c03e96c2acea51f8ae13
SHA1d10fa3db0cef3bee143e817b3e315bba90f32f4a
SHA2562a79db2d1dfa9b98af33fbf9edc0617534584f1dd6c822c830f7d90972657add
SHA512a64d0e85943be7e77abcde2628b6654e09389c35ae998b9ded42078f193df8ef42d545aaaebd4fe3237ed8893f6c51cafef36adedab2d8d1528b8a6ea67c0ac0
-
Filesize
5.3MB
MD5e8b55f49eb569e1c8e863967b2de7fa0
SHA10bf867f11b92c1f5e979220a530473ec2311430b
SHA2561b77f89f1ad53ab9f5c4778a1208e8e8a7b6ffa6a28cadb7cac7b3aae6885da9
SHA512851e9fa3561883f7018a7350d19c046c6b747a1e715b73fce9264b53a0af9f73ef17dc9d50e912cb9c736b9024d1063c9ef8205fe177e2a2efcc1a19b47b4fc9
-
Filesize
5.3MB
MD5e8b55f49eb569e1c8e863967b2de7fa0
SHA10bf867f11b92c1f5e979220a530473ec2311430b
SHA2561b77f89f1ad53ab9f5c4778a1208e8e8a7b6ffa6a28cadb7cac7b3aae6885da9
SHA512851e9fa3561883f7018a7350d19c046c6b747a1e715b73fce9264b53a0af9f73ef17dc9d50e912cb9c736b9024d1063c9ef8205fe177e2a2efcc1a19b47b4fc9
-
Filesize
280KB
MD5f030bb1f10b34026ebafa6aa5b271efe
SHA1d9a19ab96dc2631b8bab0139e4c520251fe40382
SHA2567eee88239b4f4af29fa9229ca8af17473696e3ce39bfd89d664cdf579dcea7a6
SHA5120c9698b51fdb2a772598da2ca3c7ea242dd9d4ed4c21416308aa3fd34701a0beb43bff42b6575cf88143d1a9b60a64f9a7a0c3892c0cf81329d6ace994dd03b5
-
Filesize
280KB
MD5f030bb1f10b34026ebafa6aa5b271efe
SHA1d9a19ab96dc2631b8bab0139e4c520251fe40382
SHA2567eee88239b4f4af29fa9229ca8af17473696e3ce39bfd89d664cdf579dcea7a6
SHA5120c9698b51fdb2a772598da2ca3c7ea242dd9d4ed4c21416308aa3fd34701a0beb43bff42b6575cf88143d1a9b60a64f9a7a0c3892c0cf81329d6ace994dd03b5
-
Filesize
1.4MB
MD5e82079a897fd57748fc81e77b5756e65
SHA16204f217f4986be91d48552bcd4aa1b772b1832c
SHA2561d339e41ca9d5337b410feec1ca808a7ad8b0af2cb6827cfe581cacbe04ba376
SHA5128a0268858459d149148a0941866a90bc7fb2a8e4761f35f3fbca3a4d90a438f89bfcd71c3d35bfb62c95d1e1391b23ab32421e88573815c81293e166cdcfd956
-
Filesize
1.4MB
MD5e9f0405aa557d9db4352c3473122905f
SHA1b87740872aba806e4c3030e3baad9e5909ec33dd
SHA256507262cb88b8ebc64a79451c49cd3b59eab97f4b81d265b51d6ccba487ba8301
SHA512df38fb203b2f30a95d97f0b74321e04eb7f5eaa8d27428d3fe33fb40537902538758e6a04cc592c3d76ee2bfba54736457e493b60caa9285e115b5d732a77919
-
Filesize
1.4MB
MD5e9f0405aa557d9db4352c3473122905f
SHA1b87740872aba806e4c3030e3baad9e5909ec33dd
SHA256507262cb88b8ebc64a79451c49cd3b59eab97f4b81d265b51d6ccba487ba8301
SHA512df38fb203b2f30a95d97f0b74321e04eb7f5eaa8d27428d3fe33fb40537902538758e6a04cc592c3d76ee2bfba54736457e493b60caa9285e115b5d732a77919
-
Filesize
142KB
MD577e483778406136733586ce9c833cf37
SHA13f39df0df7cf7e967e30ab7840bc4c7f1ece1d52
SHA256f8302919d3152b64ae0111b2ddcb4b21e63b674d10e203c05c2a7af015ba6710
SHA5128c328a77a3b00fa67dac4be86cf301e17f46ee0e9eb4ed81681181035a6948c83e1ea70efdfe6ca39d4963de283a887bc468b9d1232d125e4cbed4afdefb45da
-
Filesize
142KB
MD577e483778406136733586ce9c833cf37
SHA13f39df0df7cf7e967e30ab7840bc4c7f1ece1d52
SHA256f8302919d3152b64ae0111b2ddcb4b21e63b674d10e203c05c2a7af015ba6710
SHA5128c328a77a3b00fa67dac4be86cf301e17f46ee0e9eb4ed81681181035a6948c83e1ea70efdfe6ca39d4963de283a887bc468b9d1232d125e4cbed4afdefb45da
-
Filesize
51KB
MD5d1194351851346aeeeaa491ae21f45d0
SHA10faa47bd2fc7070c856ef4a34b4b5dac72b12519
SHA2565507baf70c2231856d49a16feb4c2c01946a1a166d8d042e3661eea622e8cb15
SHA512e345a5d0c9cb99cdfc4a4019422532fe5df079c39d628dc26da10f937302c032b4bb96b1c07dfd505c8c318da8d524703f8661080f6b665d58b0a6bd748cd844
-
Filesize
51KB
MD5d1194351851346aeeeaa491ae21f45d0
SHA10faa47bd2fc7070c856ef4a34b4b5dac72b12519
SHA2565507baf70c2231856d49a16feb4c2c01946a1a166d8d042e3661eea622e8cb15
SHA512e345a5d0c9cb99cdfc4a4019422532fe5df079c39d628dc26da10f937302c032b4bb96b1c07dfd505c8c318da8d524703f8661080f6b665d58b0a6bd748cd844
-
Filesize
91KB
MD564849c3b3e38e75782a9ca3ead09e89b
SHA1645e509d3a6af15ce6a64ec75fc61b8769ef2c14
SHA25697262ec9688ba204c97fba061bc95b24c2cd67b8839d43217024a542e9d8f124
SHA512e0e9dfbfdf0f102d6217e69a965c97c210cb4ac8a971022ef5aff1da12ec3f7c0e04ca2272c40ca14c5eac89af49a3e6e5e8557e3db7488c2558edcf08d9d602
-
Filesize
91KB
MD564849c3b3e38e75782a9ca3ead09e89b
SHA1645e509d3a6af15ce6a64ec75fc61b8769ef2c14
SHA25697262ec9688ba204c97fba061bc95b24c2cd67b8839d43217024a542e9d8f124
SHA512e0e9dfbfdf0f102d6217e69a965c97c210cb4ac8a971022ef5aff1da12ec3f7c0e04ca2272c40ca14c5eac89af49a3e6e5e8557e3db7488c2558edcf08d9d602
-
Filesize
644KB
MD5edef53778eaafe476ee523be5c2ab67f
SHA158c416508913045f99cdf559f31e71f88626f6de
SHA25692faedd18a29e1bd2dd27a1d805ea5aa3e73b954a625af45a74f49d49506d20f
SHA5127fc931c69aca6a09924c84f57a4a2bcf506859ab02f622d858e9e13d5917c5d3bdd475ba88f7a7e537bdae84ca3df9c3a7c56b2b0ca3c2d463bd7e9b905e2ef8
-
Filesize
940KB
MD5aeb29ccc27e16c4fd223a00189b44524
SHA145a6671c64f353c79c0060bdafea0ceb5ad889be
SHA256d28c7ab34842b6149609bd4e6b566ddab8b891f0d5062480a253ef20a6a2caaa
SHA5122ec4d768a07cfa19d7a30cbd1a94d97ba4f296194b9c725cef8e50a2078e9e593a460e4296e033a05b191dc863acf6879d50c2242e82fe00054ca1952628e006
-
Filesize
55KB
MD5b905ed9c55b709638cf1701c5ef1d7d9
SHA1c8537eabcb0a1202a095366465e4b37f1d382092
SHA2568f73f27668287390abe297872ef69ebf5ba8e9b868095921df60d13244f32c85
SHA5126bf4a7054a22a312371ffd688bbb47b6ac407e3215d81d41672869841640498cd76563b6878dca146d490e6f1c7fabd29a619c615e045f4a7c7f237933773001
-
Filesize
55KB
MD5b905ed9c55b709638cf1701c5ef1d7d9
SHA1c8537eabcb0a1202a095366465e4b37f1d382092
SHA2568f73f27668287390abe297872ef69ebf5ba8e9b868095921df60d13244f32c85
SHA5126bf4a7054a22a312371ffd688bbb47b6ac407e3215d81d41672869841640498cd76563b6878dca146d490e6f1c7fabd29a619c615e045f4a7c7f237933773001
-
Filesize
66KB
MD5ee055c11fe2c2241dcef3c8750a030db
SHA18cee78d555263f8f95967b47bd755e1f0c7c548a
SHA25659f455aa53db2548935a06470f69c9c0c4815fedbdfcb99da9907c36cfcefd25
SHA5121a5adeba0c4fd8168b806d1ab374352c32bbad2667f269c8df1c7cff856866260346e4a925838765955f0a6a928810722894fff363f18c6561a1ba96bd42b509
-
Filesize
66KB
MD5ee055c11fe2c2241dcef3c8750a030db
SHA18cee78d555263f8f95967b47bd755e1f0c7c548a
SHA25659f455aa53db2548935a06470f69c9c0c4815fedbdfcb99da9907c36cfcefd25
SHA5121a5adeba0c4fd8168b806d1ab374352c32bbad2667f269c8df1c7cff856866260346e4a925838765955f0a6a928810722894fff363f18c6561a1ba96bd42b509
-
Filesize
1.9MB
MD5c1e32fcd08cc33da65ec4d2bda0c11ac
SHA1888f2a2ae590e2e96b2464149989824f14a6c89f
SHA2560991fbb3f8272008a4326f0a59797d8b7ff2beda6d7b5b8925205134a62ec3a0
SHA512e3e8231b5f225c07f6709a62e0ef3784313883dc8bc53b4f1e27aa0221b1c720f6d82e2c6706cb6e6b08cc04f5d4ae36e4275b3465b44954514c7cc9a835f1c8
-
Filesize
1.9MB
MD5c1e32fcd08cc33da65ec4d2bda0c11ac
SHA1888f2a2ae590e2e96b2464149989824f14a6c89f
SHA2560991fbb3f8272008a4326f0a59797d8b7ff2beda6d7b5b8925205134a62ec3a0
SHA512e3e8231b5f225c07f6709a62e0ef3784313883dc8bc53b4f1e27aa0221b1c720f6d82e2c6706cb6e6b08cc04f5d4ae36e4275b3465b44954514c7cc9a835f1c8
-
Filesize
4.9MB
MD5ab3182a8881dcbda5951719830ac1a91
SHA14d1843b652ed6752eb617d6aa521181bdba39570
SHA256624b011fb101fac2fa89d16e446bb0d52e347f5de93a9011eff37010ba127e87
SHA512f1f37607727da5048d6274ed5517216af4fe0730e89a77fa1d75ed78d4162b10915f2225495b50ed5dd7c3c6484013e31d65c2eb97bf2b4c21cad8ebfc6be690
-
Filesize
4.9MB
MD5ab3182a8881dcbda5951719830ac1a91
SHA14d1843b652ed6752eb617d6aa521181bdba39570
SHA256624b011fb101fac2fa89d16e446bb0d52e347f5de93a9011eff37010ba127e87
SHA512f1f37607727da5048d6274ed5517216af4fe0730e89a77fa1d75ed78d4162b10915f2225495b50ed5dd7c3c6484013e31d65c2eb97bf2b4c21cad8ebfc6be690
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e