Resubmissions
19/11/2022, 21:40
221119-1jgzlacd49 819/11/2022, 13:48
221119-q4ed4adg34 1019/11/2022, 06:26
221119-g7aqmscg91 1019/11/2022, 05:30
221119-f67hjsbc8t 1015/11/2022, 20:50
221115-zm3j2abf6y 1015/11/2022, 20:50
221115-zmpm6sfh23 1015/11/2022, 20:49
221115-zl6kasfg98 1015/11/2022, 20:19
221115-y4ct9sff87 1014/11/2022, 19:39
221114-yc4tnsdb92 1014/11/2022, 19:34
221114-yakb9adb83 10Analysis
-
max time kernel
647s -
max time network
834s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2022, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
Resource
win10v2004-20220901-en
General
-
Target
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
-
Size
307KB
-
MD5
0abe50c1509136bf62d2184ab439e7a5
-
SHA1
722a7e2a0dd66f506ba93d24946b8bf504b100c0
-
SHA256
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50
-
SHA512
0c232d1eaf68c0099fb499fcd40bb33cd604f0259a71b853c296e00cc468342de95548ccf61d9e904cef5d34fd94defbb43f844e9f50a51517c7c95ab66862c5
-
SSDEEP
6144:Gu0FGLnBOUaLPP7S9dW8dsgMF24raEn2E1a:Gu0wTBOU2Pj6EisgM/uUv
Malware Config
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2928-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
Modifies system executable filetype association 2 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\PDFMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\PDFMenu\ = "{C9860A7C-5A19-4066-96C3-577EFF8B6EE3}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDriveSetup.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 7144 created 5952 7144 svchost.exe 297 PID 7144 created 5656 7144 svchost.exe 299 -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request 64 IoCs
flow pid Process 160 2900 rundll32.exe 480 2900 rundll32.exe 486 2900 rundll32.exe 491 2900 rundll32.exe 493 2900 rundll32.exe 501 2900 rundll32.exe 510 2900 rundll32.exe 512 2900 rundll32.exe 514 2900 rundll32.exe 521 2900 rundll32.exe 540 2900 rundll32.exe 542 2900 rundll32.exe 544 2900 rundll32.exe 546 2900 rundll32.exe 547 2900 rundll32.exe 548 2900 rundll32.exe 549 2900 rundll32.exe 550 2900 rundll32.exe 551 2900 rundll32.exe 552 2900 rundll32.exe 553 2900 rundll32.exe 554 2900 rundll32.exe 555 2900 rundll32.exe 557 2900 rundll32.exe 558 2900 rundll32.exe 559 2900 rundll32.exe 560 2900 rundll32.exe 561 2900 rundll32.exe 562 2900 rundll32.exe 563 2900 rundll32.exe 564 2900 rundll32.exe 565 2900 rundll32.exe 566 2900 rundll32.exe 567 2900 rundll32.exe 568 2900 rundll32.exe 569 2900 rundll32.exe 570 2900 rundll32.exe 571 2900 rundll32.exe 573 2900 rundll32.exe 575 2900 rundll32.exe 577 2900 rundll32.exe 580 2900 rundll32.exe 581 2900 rundll32.exe 582 2900 rundll32.exe 584 2900 rundll32.exe 586 2900 rundll32.exe 587 2900 rundll32.exe 596 2900 rundll32.exe 598 2900 rundll32.exe 599 2900 rundll32.exe 618 2900 rundll32.exe 514 2900 rundll32.exe 625 2900 rundll32.exe 626 2900 rundll32.exe 635 2900 rundll32.exe 493 2900 rundll32.exe 638 2900 rundll32.exe 644 2900 rundll32.exe 648 2900 rundll32.exe 650 2900 rundll32.exe 651 2900 rundll32.exe 652 2900 rundll32.exe 654 2900 rundll32.exe 656 2900 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 3760 ChromSetup.exe 1188 ChromSetup.tmp 4564 7F32.exe 4388 vwfcehv 5648 64.exe 5732 setup.exe 5752 setup.exe 5724 chrome.exe 2488 setup.exe 5144 chromnius.exe 3704 chromnius.exe 4412 chromnius.exe 4824 chromnius.exe 4976 chromnius.exe 5800 chromnius.exe 6212 chromnius.exe 6320 chromnius.exe 6340 chromnius.exe 6348 driver_booster_setup.exe 6540 driver_booster_setup.tmp 6568 chromnius.exe 6612 chromnius.exe 6664 chromnius.exe 6780 chromnius.exe 6860 chromnius.exe 6884 chromnius.exe 7000 chromnius.exe 7020 chromnius.exe 7112 chromnius.exe 5648 chromnius.exe 6912 chrmstp.exe 1208 chrmstp.exe 680 chrmstp.exe 5964 chrmstp.exe 208 chromnius.exe 4344 chromnius.exe 5004 driver_booster_setup.exe 3900 driver_booster_setup.tmp 6224 setup.exe 5952 OneDriveSetup.exe 5656 OneDriveSetup.exe 5660 driver_booster_setup.exe 4812 driver_booster_setup.tmp 4652 FileSyncConfig.exe 428 OneDrive.exe 4236 ProductStat.exe 232 CareScan.exe 5616 GpuCheck.exe 5732 SetupHlp.exe 4560 cmd.exe 6320 InstStat.exe 4448 DriverBooster.exe 5904 IObitDownloader.exe 5992 iScrPaint.exe 2868 HWiNFO.exe 6180 Manta.exe 6332 AUDIODG.EXE 4280 ChangeIcon.exe 6220 NoteIcon.exe 1344 RttHlp.exe 6452 mousocoreworker.exe 4948 iTopPDF.exe 5728 iTopSetup.exe 4592 iTopSetup.tmp -
Modifies Installed Components in the registry 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{7D2B3E1D-D096-4594-9D8F-A6667F12E0AC}\StubPath = "\"C:\\Program Files\\Chromnius\\Application\\109.0.5386.0\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{7D2B3E1D-D096-4594-9D8F-A6667F12E0AC}\Localized Name = "Chromnius" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{7D2B3E1D-D096-4594-9D8F-A6667F12E0AC}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{7D2B3E1D-D096-4594-9D8F-A6667F12E0AC}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{7D2B3E1D-D096-4594-9D8F-A6667F12E0AC} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{7D2B3E1D-D096-4594-9D8F-A6667F12E0AC}\ = "Chromnius" setup.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileCoAuthLib64.dll" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\INPROCSERVER32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\WOW6432NODE\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\INPROCSERVER32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32\ThreadingModel = "Apartment" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe\" /cci /client=Personal" OneDrive.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{635EFA6F-08D6-4EC9-BD14-8A0FDE975159}\LocalServer32 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileSyncShell.dll" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileSyncShell.dll" OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INPROCSERVER32 FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuthLib.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}\InprocServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\amd64\\FileSyncShell64.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\amd64\\FileSyncShell64.dll" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\amd64\\FileSyncShell64.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ThreadingModel = "Both" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe\" /cci /client=Personal" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe\" /cci /client=Personal" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\amd64\\FileSyncShell64.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\amd64\\FileSyncShell64.dll" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LOCALSERVER32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ThreadingModel = "Both" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileSyncShell.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}\InprocServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32 OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LOCALSERVER32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\LocalServer32 OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\WOW6432NODE\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\INPROCSERVER32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32\ThreadingModel = "Apartment" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}\LocalServer32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\amd64\\FileSyncShell64.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ThreadingModel = "Apartment" OneDriveSetup.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\cloud_icon\Parameters\ServiceDll = "C:\\Program Files (x86)\\Windows Mail\\cloud_icon.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\cloud_icon\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService" rundll32.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 27 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopSetup.tmp Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iScrInit.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iScrRec.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iScrInit.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation chromnius.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ugin.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopPDF.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation PDFSetup.tmp Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopPDF.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopPDF.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopPDF.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation driver_booster_setup.tmp Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iScrInit.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopPDF.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopPDF.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation @[email protected] Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation chromnius.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation OneDrive.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation iTopVPN.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ISRSetup.tmp Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation IObitDownloader.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation chromnius.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation OneDriveSetup.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation driver_booster_setup.tmp Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation atud.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDACB4.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDACBB.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe -
Loads dropped DLL 64 IoCs
pid Process 2900 rundll32.exe 5144 chromnius.exe 3704 chromnius.exe 4412 chromnius.exe 5144 chromnius.exe 4824 chromnius.exe 4824 chromnius.exe 4824 chromnius.exe 4824 chromnius.exe 4824 chromnius.exe 4824 chromnius.exe 4976 chromnius.exe 4824 chromnius.exe 4976 chromnius.exe 5800 chromnius.exe 5800 chromnius.exe 6212 chromnius.exe 6212 chromnius.exe 6320 chromnius.exe 6340 chromnius.exe 6320 chromnius.exe 6340 chromnius.exe 6568 chromnius.exe 6568 chromnius.exe 6612 chromnius.exe 6664 chromnius.exe 6612 chromnius.exe 6664 chromnius.exe 6780 chromnius.exe 6780 chromnius.exe 6860 chromnius.exe 6860 chromnius.exe 6884 chromnius.exe 6884 chromnius.exe 7000 chromnius.exe 7000 chromnius.exe 7020 chromnius.exe 7020 chromnius.exe 7112 chromnius.exe 7112 chromnius.exe 5648 chromnius.exe 5648 chromnius.exe 4856 svchost.exe 6908 rundll32.exe 4652 FileSyncConfig.exe 4652 FileSyncConfig.exe 4652 FileSyncConfig.exe 4652 FileSyncConfig.exe 4652 FileSyncConfig.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4792 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\Update\\OneDriveSetup.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Standalone Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\StandaloneUpdater\\OneDriveSetup.exe\"" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run chromnius.exe -
Checks for any installed AV software in registry 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop CareScan.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CareScan.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Avira\AntiVirus CareScan.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Avast Software\Avast CareScan.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avast Software\Avast CareScan.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast CareScan.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iTopVPN.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: CareScan.exe File opened (read-only) \??\F: CareScan.exe File opened (read-only) \??\K: CareScan.exe File opened (read-only) \??\L: CareScan.exe File opened (read-only) \??\S: CareScan.exe File opened (read-only) \??\T: CareScan.exe File opened (read-only) \??\Z: CareScan.exe File opened (read-only) \??\H: CareScan.exe File opened (read-only) \??\I: CareScan.exe File opened (read-only) \??\P: CareScan.exe File opened (read-only) \??\R: CareScan.exe File opened (read-only) \??\W: CareScan.exe File opened (read-only) \??\X: CareScan.exe File opened (read-only) \??\Y: CareScan.exe File opened (read-only) \??\B: CareScan.exe File opened (read-only) \??\E: CareScan.exe File opened (read-only) \??\G: CareScan.exe File opened (read-only) \??\N: CareScan.exe File opened (read-only) \??\Q: CareScan.exe File opened (read-only) \??\V: CareScan.exe File opened (read-only) \??\J: CareScan.exe File opened (read-only) \??\M: CareScan.exe File opened (read-only) \??\O: CareScan.exe File opened (read-only) \??\U: CareScan.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 783 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 3552 2900 rundll32.exe 172 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\iTop Screen Recorder\res\stickers\is-B0TLF.tmp ISRSetup.tmp File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\is-2LLRP.tmp PDFSetup.tmp File created C:\Program Files\Chromnius\Temp\source5732_1671915962\Chrome-bin\109.0.5386.0\vulkan-1.dll setup.exe File created C:\Program Files (x86)\iTop VPN\Language\is-BJRD7.tmp iTopSetup.tmp File created C:\Program Files\iTop Screen Recorder\is-IOJLV.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\is-ON99G.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\is-HE6HE.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\is-LTKAC.tmp ISRSetup.tmp File created C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\setup.exe setup.exe File created C:\Program Files (x86)\iTop VPN\is-IL0VU.tmp iTopSetup.tmp File created C:\Program Files (x86)\iTop VPN\Database\is-O3AD1.tmp iTopSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\1x\is-HV407.tmp ISRSetup.tmp File created C:\Program Files\iTop PDF\language\is-1T4FV.tmp PDFSetup.tmp File created C:\Program Files (x86)\iTop VPN\Flag\[email protected] iTopVPN.exe File created C:\Program Files (x86)\Windows Mail\AcroRd32Info.exe rundll32.exe File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Icons\Apps\is-PC5N6.tmp driver_booster_setup.tmp File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\database\startupSignature.db CareScan.exe File created C:\Program Files\iTop PDF\locales\is-P2GH0.tmp PDFSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-90AC9.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-8PLFJ.tmp ISRSetup.tmp File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DrvInstall\is-VQP94.tmp driver_booster_setup.tmp File created C:\Program Files\iTop Screen Recorder\is-U4BTE.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\is-32U8G.tmp ISRSetup.tmp File created C:\Program Files (x86)\iTop VPN\Flag\[email protected] iTopVPN.exe File created C:\Program Files\iTop Screen Recorder\res\transitions\is-UO37J.tmp ISRSetup.tmp File created C:\Program Files (x86)\iTop VPN\Language\is-ONEDJ.tmp iTopSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-MECEM.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-QP78O.tmp ISRSetup.tmp File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\is-4QP2N.tmp driver_booster_setup.tmp File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\assets\webviewer\core\assets\mime-types\is-DVS1K.tmp PDFSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\is-10IKG.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\1x\is-1AEBC.tmp ISRSetup.tmp File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\is-B6T9C.tmp PDFSetup.tmp File created C:\Program Files (x86)\Windows Mail\adobe_spinner_mini.gif rundll32.exe File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Language\is-HUBNT.tmp driver_booster_setup.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Update\appver-ac.ini AUDIODG.EXE File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-1I5HH.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\transitions\is-4VON3.tmp ISRSetup.tmp File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\assets\webviewer\core\pdf\is-DSLAS.tmp PDFSetup.tmp File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Database\Scan\WhiteList.db SetupHlp.exe File created C:\Program Files\iTop Screen Recorder\is-K82EI.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\is-A1QHI.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\1x\is-JK09A.tmp ISRSetup.tmp File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\assets\webviewer\core\is-A0A5R.tmp PDFSetup.tmp File created C:\Program Files (x86)\Windows Mail\core_icons.png rundll32.exe File created C:\Program Files (x86)\iTop VPN\itvwd64.sys ugin.exe File created C:\Program Files\iTop Screen Recorder\res\stickers\is-L6K5N.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-IBDKT.tmp ISRSetup.tmp File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Language\is-7PCJG.tmp driver_booster_setup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\is-2EVTJ.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-P8382.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\2x\is-ITGBT.tmp ISRSetup.tmp File created C:\Program Files (x86)\iTop VPN\Flag\[email protected] iTopVPN.exe File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\assets\language\is-452QJ.tmp PDFSetup.tmp File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\ErrCodeSpec\is-7F54S.tmp driver_booster_setup.tmp File created C:\Program Files (x86)\iTop VPN\Flag\[email protected] iTopVPN.exe File created C:\Program Files\iTop PDF\resources\app\.webpack\main\tools\assets\officeWatermark\is-DMB6R.tmp PDFSetup.tmp File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\is-CESJ3.tmp PDFSetup.tmp File created C:\Program Files\Chromnius\Temp\source5732_1671915962\Chrome-bin\109.0.5386.0\MEIPreload\manifest.json setup.exe File created C:\Program Files (x86)\IObit\Driver Booster\10.0.0\History\is-TJNR1.tmp driver_booster_setup.tmp File created C:\Program Files (x86)\iTop VPN\is-DOVEL.tmp iTopSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\is-ERQ2I.tmp ISRSetup.tmp File created C:\Program Files\iTop Screen Recorder\res\stickers\thumbs\1x\is-30GI1.tmp ISRSetup.tmp File created C:\Program Files\iTop PDF\resources\app\.webpack\renderer\is-K0VSO.tmp PDFSetup.tmp -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\INF\c_display.PNF DriverBooster.exe File created C:\Windows\INF\c_processor.PNF DriverBooster.exe File created C:\Windows\INF\c_monitor.PNF DriverBooster.exe File created C:\Windows\INF\c_volume.PNF DriverBooster.exe File created C:\Windows\INF\c_diskdrive.PNF DriverBooster.exe File created C:\Windows\INF\c_media.PNF DriverBooster.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4048 sc.exe 4556 sc.exe 912 sc.exe 4956 sc.exe 5420 sc.exe 5576 sc.exe 1316 sc.exe 3832 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3164 4564 WerFault.exe 128 6148 5992 WerFault.exe 482 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LocationInformation DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ DriverBooster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0002\ iTopPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0002 GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064\ GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064 iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ DriverBooster.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064\ chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID iTopPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Address GpuCheck.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DriverBooster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0004 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceCharacteristics chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0002\ GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service GpuCheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0002 iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LocationInformation DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Address chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0002 iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName DriverBooster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064 iTopPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Mfg GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc DriverBooster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0002 DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064\ iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ GpuCheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver GpuCheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vwfcehv Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0002\ DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064\ chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Mfg GpuCheck.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Driver chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs iTopPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003 iTopPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 iTopPDF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DriverBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0004\ chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc GpuCheck.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data svchost.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OneDrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString DriverBooster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet svchost.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OneDrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DriverBooster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe -
Delays execution with timeout.exe 10 IoCs
pid Process 2000 timeout.exe 4700 timeout.exe 4568 timeout.exe 5252 timeout.exe 2184 timeout.exe 4028 timeout.exe 224 timeout.exe 4028 timeout.exe 2948 timeout.exe 5444 timeout.exe -
Enumerates system info in registry 2 TTPs 21 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chromnius.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chromnius.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chromnius.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 6988 ipconfig.exe -
Kills process with taskkill 11 IoCs
pid Process 1656 taskkill.exe 1960 taskkill.exe 6184 taskkill.exe 5212 taskkill.exe 4396 taskkill.exe 5372 taskkill.exe 1948 taskkill.exe 4272 taskkill.exe 6400 taskkill.exe 1356 taskkill.exe 3988 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync Explorer.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chromnius.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133133394768955018" chromnius.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C}\ = "ICheckFileHashCallback" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}\TypeLib OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileSyncShell.dll" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32 OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\INTERFACE\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98}\TYPELIB OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\.note\shell\open\command OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{1B71F23B-E61F-45C9-83BA-235D55F50CF9}\TypeLib OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}\LocalServer32 OneDrive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EE5DE88-B879-438E-9ED1-271C0C313341}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iTopPDF\DefaultIcon PDFInit.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\WOW6432NODE\INTERFACE\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{e9de26a1-51b2-47b4-b1bf-c87059cc02a7} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\WOW6432NODE\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\VERSIONINDEPENDENTPROGID OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{EE15BBBB-9E60-4C52-ABCB-7540FF3DF6B3}\TypeLib OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{1196AE48-D92B-4BC7-85DE-664EC3F761F1}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B88C45B9-8825-4629-B83E-77CC67D9CEED}\1.0\0\win64\ = "C:\\Program Files\\Chromnius\\Application\\109.0.5386.0\\elevation_service.exe" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{B54E7079-90C9-4C62-A6B8-B2834C33A04A}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\ProgID\ = "SyncEngineFileInfoProvider.SyncEngineFileInfoProvider.1" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}\VersionIndependentProgID\ = "BannerNotificationHandler.BannerNotificationHandler" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{9D613F8A-B30E-4938-8490-CB5677701EBF}\TypeLib OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\TypeLib OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{0776ae27-5ab9-4e18-9063-1836da63117a}\TypeLib OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SyncEngineStorageProviderHandlerProxy.SyncEngineStorageProviderHandlerProxy\CurVer OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\TypeLib\{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}\1.0 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{F062BA81-ADFE-4A92-886A-23FD851D6406}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\ = "UpToDateCloudOverlayHandler Class" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\WOW6432NODE\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\PROGID OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{ACDB5DB0-C9D5-461C-BAAA-5DCE0B980E40}\ = "ILaunchUXInterface" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{B54E7079-90C9-4C62-A6B8-B2834C33A04A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{466F31F7-9892-477E-B189-FA5C59DE3603}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{0d4e4444-cb20-4c2b-b8b2-94e5656ecae8}\ProxyStubClsid32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{EA23A664-A558-4548-A8FE-A6B94D37C3CF}\ = "ISyncEngine" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{1B71F23B-E61F-45C9-83BA-235D55F50CF9}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\ = "UpToDateUnpinnedOverlayHandler Class" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{049FED7E-C3EA-4B66-9D92-10E8085D60FB}\ProxyStubClsid32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\TypeLib\{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe\\1" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{10C9242E-D604-49B5-99E4-BF87945EF86C}\ = "ISyncChangesCallback" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\ = "FileSyncEx" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_CLASSES\WOW6432NODE\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\LOCALSERVER32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{5D5DD08F-A10E-4FEF-BCA7-E73E666FC66C} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{5D5DD08F-A10E-4FEF-BCA7-E73E666FC66C}\ProxyStubClsid32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334}\TypeLib\Version = "1.0" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Directory\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{e9de26a1-51b2-47b4-b1bf-c87059cc02a7} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\ = "IFileSyncOutOfProcServices" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{10C9242E-D604-49B5-99E4-BF87945EF86C} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}\ProxyStubClsid32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface\{EE15BBBB-9E60-4C52-ABCB-7540FF3DF6B3}\TypeLib OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\TypeLib\{F904F88C-E60D-4327-9FA2-865AD075B400}\1.0\0 OneDriveSetup.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2188 reg.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 DriverBooster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 DriverBooster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 DriverBooster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 DriverBooster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 DriverBooster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 DriverBooster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D037C6B08C7C866CE39600C9C629B322B2B36F47 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D037C6B08C7C866CE39600C9C629B322B2B36F47\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 DriverBooster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 0f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e42000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e DriverBooster.exe -
Suspicious behavior: AddClipboardFormatListener 11 IoCs
pid Process 776 Explorer.EXE 776 Explorer.EXE 936 OneDrive.exe 428 OneDrive.exe 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 2928 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 5064 chrome.exe 5064 chrome.exe 2384 chrome.exe 2384 chrome.exe 2900 chrome.exe 2900 chrome.exe 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 4544 chrome.exe 4544 chrome.exe 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 776 Explorer.EXE 5832 taskmgr.exe 428 OneDrive.exe -
Suspicious behavior: LoadsDriver 8 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2928 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 4388 vwfcehv -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3600 msedge.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 6108 msedge.exe 6108 msedge.exe 6108 msedge.exe 6108 msedge.exe 6216 chrome.exe 6216 chrome.exe 6216 chrome.exe 6216 chrome.exe 6216 chrome.exe 6216 chrome.exe 6216 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe 6048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeDebugPrivilege 448 powershell.exe Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 1188 ChromSetup.tmp 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3552 rundll32.exe 3600 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3600 msedge.exe 776 Explorer.EXE 3600 msedge.exe 776 Explorer.EXE 776 Explorer.EXE 3600 msedge.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 3204 chrome.exe 776 Explorer.EXE 3204 chrome.exe 776 Explorer.EXE -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 936 OneDrive.exe 776 Explorer.EXE 776 Explorer.EXE 428 OneDrive.exe 428 OneDrive.exe 428 OneDrive.exe 776 Explorer.EXE 4292 chrome.exe 3472 ProductStat.exe 4876 iScrRec.exe 4356 AUpdate.exe 5992 iScrPaint.exe 5992 iScrPaint.exe 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 428 OneDrive.exe 776 Explorer.EXE 776 Explorer.EXE 428 OneDrive.exe 428 OneDrive.exe 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 5020 2384 chrome.exe 84 PID 2384 wrote to memory of 5020 2384 chrome.exe 84 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 4620 2384 chrome.exe 86 PID 2384 wrote to memory of 5064 2384 chrome.exe 87 PID 2384 wrote to memory of 5064 2384 chrome.exe 87 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 PID 2384 wrote to memory of 2004 2384 chrome.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4492 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe"C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff82e9c4f50,0x7ff82e9c4f60,0x7ff82e9c4f703⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:23⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1908 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 /prefetch:83⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:13⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:13⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:13⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4408 /prefetch:83⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4736 /prefetch:83⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4864 /prefetch:83⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4748 /prefetch:83⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4968 /prefetch:83⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4916 /prefetch:83⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3696 /prefetch:83⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:13⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:13⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:13⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:13⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3248 /prefetch:83⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6080 /prefetch:83⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:13⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:13⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:13⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:83⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5732 /prefetch:83⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3360 /prefetch:83⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:83⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 /prefetch:83⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:4212
-
-
C:\Users\Admin\Downloads\ChromSetup.exe"C:\Users\Admin\Downloads\ChromSetup.exe"3⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\is-9N10R.tmp\ChromSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-9N10R.tmp\ChromSetup.tmp" /SL5="$1301BA,798627,786944,C:\Users\Admin\Downloads\ChromSetup.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1188 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\chrome.bat" install"5⤵PID:1784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\\chrome.ps16⤵
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:1000
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Google\Chrome\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "path" /t REG_SZ /d C:\\apps.crx /f6⤵PID:4128
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Google\Chrome\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "version" /t REG_SZ /d 1.8 /f6⤵PID:1248
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Policies\Google\Chrome\ExtensionInstallAllowlist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:4212
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Google\Chrome\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "path" /t REG_SZ /d C:\\apps.crx /f6⤵PID:2868
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Google\Chrome\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "version" /t REG_SZ /d 1.8 /f6⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --load-extension="C:\apps-helper" --no-startup-window6⤵PID:3988
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff82e9c4f50,0x7ff82e9c4f60,0x7ff82e9c4f707⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1760,211559598490726650,4239659973092791398,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1768 /prefetch:87⤵PID:3808
-
-
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:2184
-
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:2000
-
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:4028
-
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:224
-
-
C:\Windows\system32\timeout.exetimeout 86⤵
- Delays execution with timeout.exe
PID:4028
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\edge.bat" install"5⤵
- Checks computer location settings
PID:4776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\\edge.ps16⤵PID:1664
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:1660
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Edge\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "path" /t REG_SZ /d C:\\apps.crx /f6⤵PID:4596
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Edge\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "version" /t REG_SZ /d 1.8 /f6⤵PID:3320
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Policies\Microsoft\Edge\ExtensionInstallAllowlist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:4148
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Microsoft\Edge\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "path" /t REG_SZ /d C:\\apps.crx /f6⤵PID:4012
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Microsoft\Edge\Extensions\pejhfhcoekcajgokallhmklcjkkeemgj" /v "version" /t REG_SZ /d 1.8 /f6⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default" --load-extension="C:\apps-helper" --no-startup-window6⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff82e8a46f8,0x7ff82e8a4708,0x7ff82e8a47187⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:27⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:37⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:87⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3460 /prefetch:87⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:17⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4840 /prefetch:87⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5080 /prefetch:87⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 /prefetch:87⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5004 /prefetch:87⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:17⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:17⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:17⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5640 /prefetch:87⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5816 /prefetch:87⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2588 /prefetch:27⤵PID:6828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,18012099487170186369,17272598202197762278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:87⤵PID:6868
-
-
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:4700
-
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:4568
-
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:2948
-
-
C:\Windows\system32\timeout.exetimeout 86⤵
- Delays execution with timeout.exe
PID:5444
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\64.exe"C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\64.exe" --system-level5⤵
- Executes dropped EXE
PID:5648 -
C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\CHROME.PACKED.7Z" --system-level6⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
PID:5732 -
C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --annotation=plat=Win64 --annotation=prod=Chromnius --annotation=ver=109.0.5386.0 --initial-client-data=0x260,0x264,0x268,0x23c,0x26c,0x7ff7a86c7f80,0x7ff7a86c7f90,0x7ff7a86c7fa07⤵
- Executes dropped EXE
PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exe" --system-level --verbose-logging --create-shortcuts=0 --install-level=17⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\CR_095E9.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --annotation=plat=Win64 --annotation=prod=Chromnius --annotation=ver=109.0.5386.0 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7a86c7f80,0x7ff7a86c7f90,0x7ff7a86c7fa08⤵
- Executes dropped EXE
PID:2488
-
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --from-installer7⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:5144 -
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Chromnius\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Chromnius\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Chromnius\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Chromnius --annotation=ver=109.0.5386.0 --initial-client-data=0x100,0x104,0x108,0xd4,0x10c,0x7ff829ffde28,0x7ff829ffde38,0x7ff829ffde488⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3704 -
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Chromnius\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Chromnius\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Chromnius --annotation=ver=109.0.5386.0 --initial-client-data=0x13c,0x140,0x144,0xec,0x148,0x7ff7527a9c68,0x7ff7527a9c78,0x7ff7527a9c889⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4412
-
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=gpu-process --start-stack-profiler --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4824
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --start-stack-profiler --mojo-platform-channel-handle=1844 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4976
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5800
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=renderer --first-renderer-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3560 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:18⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:6212
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=renderer --extension-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3468 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:18⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:6320
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3996 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6340
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=renderer --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=4460 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6568
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4656 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6612
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6664
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5040 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6780
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5208 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6860
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5232 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6884
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5620 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7000
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5676 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7020
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5652 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7112
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6132 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5648
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=renderer --extension-process --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=6308 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:18⤵
- Executes dropped EXE
PID:208
-
-
C:\Program Files\Chromnius\Application\chromnius.exe"C:\Program Files\Chromnius\Application\chromnius.exe" --type=renderer --extension-process --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=6500 --field-trial-handle=2164,i,16309565869186773222,5184715820467236005,131072 /prefetch:18⤵
- Executes dropped EXE
PID:4344
-
-
C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe"C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings8⤵
- Executes dropped EXE
PID:6912 -
C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe"C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --annotation=plat=Win64 --annotation=prod=Chromnius --annotation=ver=109.0.5386.0 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6bb967f80,0x7ff6bb967f90,0x7ff6bb967fa09⤵
- Executes dropped EXE
PID:1208
-
-
C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe"C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Chromnius\Application\master_preferences" --create-shortcuts=1 --install-level=09⤵
- Executes dropped EXE
PID:680 -
C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe"C:\Program Files\Chromnius\Application\109.0.5386.0\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --annotation=plat=Win64 --annotation=prod=Chromnius --annotation=ver=109.0.5386.0 --initial-client-data=0x220,0x224,0x228,0x200,0x22c,0x7ff6bb967f80,0x7ff6bb967f90,0x7ff6bb967fa010⤵
- Executes dropped EXE
PID:5964
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\close.bat" install"5⤵PID:3924
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
PID:5252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\is-G70PU.tmp\\chromnius.ps16⤵PID:6788
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\g0ijumgf\g0ijumgf.cmdline"7⤵PID:6608
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES352.tmp" "c:\Users\Admin\AppData\Local\Temp\g0ijumgf\CSC2BE66601F7974EE9BEEF279A8B99E9C0.TMP"8⤵PID:1908
-
-
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- Kills process with taskkill
PID:1948
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- Kills process with taskkill
PID:4272
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:6428
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Policies\Google\Chrome\ExtensionInstallForcelist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:7160
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:6112
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\WOW6432Node\Policies\Microsoft\Edge\ExtensionInstallForcelist" /v "1" /t REG_SZ /d pejhfhcoekcajgokallhmklcjkkeemgj /f6⤵PID:6120
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12913417202416927604,8590548709043098166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3012 /prefetch:83⤵PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\7F32.exeC:\Users\Admin\AppData\Local\Temp\7F32.exe2⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Wuwedteata.tmp",Tiuqiiueaur3⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies system certificate store
- outlook_office_path
- outlook_win_path
PID:2900 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 225354⤵
- Suspicious use of FindShellTrayWindow
PID:3552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:5444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:1580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 5283⤵
- Program crash
PID:3164
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3204 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ff82e9c4f50,0x7ff82e9c4f60,0x7ff82e9c4f703⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2028 /prefetch:83⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1772 /prefetch:83⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1704 /prefetch:23⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2880 /prefetch:13⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:13⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3504 /prefetch:83⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3724 /prefetch:83⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:13⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3840 /prefetch:83⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4380 /prefetch:83⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4540 /prefetch:83⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5164 /prefetch:83⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5128 /prefetch:83⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5428 /prefetch:83⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:83⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2712 /prefetch:13⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 /prefetch:83⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --reenable-autoupdates --system-level3⤵PID:2948
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff77a82a890,0x7ff77a82a8a0,0x7ff77a82a8b04⤵PID:3616
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5656 /prefetch:83⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:13⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:13⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:13⤵PID:5792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:13⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:5860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:13⤵PID:5920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:13⤵PID:5972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:83⤵PID:6032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6300 /prefetch:83⤵PID:6132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6272 /prefetch:83⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3356 /prefetch:83⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6512 /prefetch:83⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=228 /prefetch:83⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=812 /prefetch:83⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:13⤵PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:13⤵PID:5804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1920 /prefetch:13⤵PID:6048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:13⤵
- Executes dropped EXE
PID:5724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:2988
-
-
C:\Users\Admin\Downloads\driver_booster_setup.exe"C:\Users\Admin\Downloads\driver_booster_setup.exe"3⤵
- Executes dropped EXE
PID:6348 -
C:\Users\Admin\AppData\Local\Temp\is-65SHP.tmp\driver_booster_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-65SHP.tmp\driver_booster_setup.tmp" /SL5="$6034C,27993564,139264,C:\Users\Admin\Downloads\driver_booster_setup.exe"4⤵
- Executes dropped EXE
PID:6540
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,577879974677499870,1712958558283514141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:83⤵PID:6708
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default2⤵PID:5140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff82e8a46f8,0x7ff82e8a4708,0x7ff82e8a47183⤵PID:4944
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"2⤵
- Modifies system executable filetype association
- Registers COM server for autorun
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart3⤵
- Executes dropped EXE
PID:5952 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode4⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies registry class
PID:5656 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
PID:4652
-
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe/updateInstalled /background5⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:428
-
-
-
-
-
C:\Users\Admin\Downloads\driver_booster_setup.exe"C:\Users\Admin\Downloads\driver_booster_setup.exe"2⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\is-SC2BM.tmp\driver_booster_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SC2BM.tmp\driver_booster_setup.tmp" /SL5="$4030A,27993564,139264,C:\Users\Admin\Downloads\driver_booster_setup.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\is-99509.tmp-dbinst\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-99509.tmp-dbinst\setup.exe" "C:\Users\Admin\Downloads\driver_booster_setup.exe" /title="Driver Booster 10" /dbver=10.0.0.65 /eula="C:\Users\Admin\AppData\Local\Temp\is-99509.tmp-dbinst\EULA.rtf" /showlearnmore /pmtproduct /nochromepmt4⤵
- Executes dropped EXE
- Checks computer location settings
PID:6224 -
C:\Users\Admin\Downloads\driver_booster_setup.exe"C:\Users\Admin\Downloads\driver_booster_setup.exe" /sp- /verysilent /Installer /norestart /DIR="C:\Program Files (x86)\IObit\Driver Booster" /Installer-DeskIcon /Installer-TaskIcon5⤵
- Executes dropped EXE
PID:5660 -
C:\Users\Admin\AppData\Local\Temp\is-5NE97.tmp\driver_booster_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-5NE97.tmp\driver_booster_setup.tmp" /SL5="$9035C,27993564,139264,C:\Users\Admin\Downloads\driver_booster_setup.exe" /sp- /verysilent /Installer /norestart /DIR="C:\Program Files (x86)\IObit\Driver Booster" /Installer-DeskIcon /Installer-TaskIcon6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
PID:4812 -
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\HWiNFO\HWiNFO.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\HWiNFO\HWiNFO.exe" /brandname7⤵PID:4236
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\CareScan.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\CareScan.exe" /savefile /silentscan /low /output="C:\Program Files (x86)\IObit\Driver Booster\10.0.0\ScanData\ScanResult_all.ini"7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Enumerates connected drives
- Drops file in Program Files directory
PID:232
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\TaskbarPin\ICONPIN64.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\TaskbarPin\ICONPIN64.exe" pin "C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DriverBooster.exe"7⤵PID:5616
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\SetupHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\SetupHlp.exe" /install /setup="C:\Users\Admin\Downloads\driver_booster_setup.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5732 -
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\RttHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\RttHlp.exe" /winstdate8⤵PID:4560
-
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\InstStat.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\InstStat.exe" /install db107⤵
- Executes dropped EXE
PID:6320
-
-
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DriverBooster.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DriverBooster.exe" /autoscan5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies system certificate store
PID:4448 -
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\HWiNFO\HWiNFO.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\HWiNFO\HWiNFO.exe" /brandname6⤵
- Executes dropped EXE
PID:2868
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStat /Code="a602" /Days=06⤵
- Executes dropped EXE
PID:6180
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\AutoUpdate.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\AutoUpdate.exe" /main /App=db10 /MainHwnd=06⤵PID:6332
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\ChangeIcon.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\ChangeIcon.exe" /0 "C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Icons\Main\"6⤵
- Executes dropped EXE
PID:4280
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\NoteIcon.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\NoteIcon.exe" "C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DriverBooster.exe"6⤵
- Executes dropped EXE
PID:6220
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStat /Code="B100" /Days=76⤵PID:4948
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStat /Code="A100" /Days=06⤵PID:6452
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\RttHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\RttHlp.exe" /cnt6⤵
- Executes dropped EXE
PID:1344
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\FaultFixes.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\FaultFixes.exe" /fix-errorcode-16⤵PID:6632
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\RttHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\RttHlp.exe" /stat6⤵PID:6784
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\AUpdate.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\AUpdate.exe" /u http://stats.iobit.com/active_month.php /a db10 /p iobit /v 10.0.0.65 /t 1 /d 7 /db /user7⤵PID:6072
-
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\SetupHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\SetupHlp.exe" /afterupgrade6⤵PID:5612
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\FaultFixes.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\FaultFixes.exe" /fix-clean-16⤵PID:6036
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStat /Code="B101" /Days=76⤵PID:5976
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStat /Code="A101" /Days=06⤵PID:5900
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DBDownloader.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DBDownloader.exe" {"proxytype":0,"task":[{"exp":"C:\\Program Files (x86)\\IObit\\Driver Booster\\10.0.0\\Database\\Scan\\WhiteList.db","u":"http://www.cd4o.com/drivers/wlst/5c491951c5c6c9814d995afeafa86716.wlst","t":3,"p":"C:\\Program Files (x86)\\IObit\\Driver Booster\\10.0.0\\Database\\Scan\\WhiteListtmp","m":"5c491951c5c6c9814d995afeafa86716","d":false}],"downtype":1}6⤵PID:6288
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStatEx /Code="b700" /Days=7 /PostNow=0 /WaitFor=0 /ExParam=""6⤵PID:4136
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStatEx /Code="a700" /Days=0 /PostNow=0 /WaitFor=0 /ExParam=""6⤵PID:3884
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DBDownloader.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\DBDownloader.exe" {"proxytype":0,"hosthandle":263464,"timeout":10,"id":16673,"task":[{"u":"http://download.windowsupdate.com/d/msdownload/update/driver/drvs/2017/07/200049213_66128c0ee9f39577ded40554e5912f3ed2046d07.cab","t":0,"p":""},{"u":"http://download.windowsupdate.com/d/msdownload/update/driver/drvs/2013/07/20578753_999fee3ed6b5ef3a08f51ced090c4827a420736e.cab","t":0,"p":""}],"downtype":4}6⤵PID:4020
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\ChangeIcon.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\ChangeIcon.exe" /1 "C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Icons\Main\"6⤵PID:2976
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStatEx /Code="b208" /Days=7 /PostNow=-1 /WaitFor=0 /ExParam=""6⤵PID:6596
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /DoCommStatEx /Code="a208" /Days=0 /PostNow=-1 /WaitFor=0 /ExParam=""6⤵PID:6636
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\Manta.exe" /CommStat /PostCommStat /Days=7 /Wait=0 /Path=""6⤵PID:6536
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.iobit.com/appgoto.php?to=install&name=db&ver=10.0.0.65&lan=&ref=db10&type=free5⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff82d7c46f8,0x7ff82d7c4708,0x7ff82d7c47186⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:26⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:36⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:86⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2776 /prefetch:16⤵PID:7132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:16⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=5260 /prefetch:86⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:16⤵PID:6348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:16⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5808 /prefetch:86⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5936 /prefetch:86⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:86⤵PID:6652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:86⤵PID:6524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5132 /prefetch:86⤵PID:6268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=price_comparison_service.mojom.DataProcessor --field-trial-handle=2104,14065856291681173313,172230071543224847,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5228 /prefetch:86⤵PID:6832
-
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\SetupHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\SetupHlp.exe" /afterinstall /setup="C:\Users\Admin\AppData\Local\Temp\is-99509.tmp-dbinst\setup.exe"5⤵PID:5992
-
-
C:\Program Files (x86)\IObit\Driver Booster\10.0.0\IObitDownloader.exe"C:\Program Files (x86)\IObit\Driver Booster\10.0.0\IObitDownloader.exe" "/Config=http://update.iobit.com/infofiles/db/rmd/freeware-db.upt" /show /lang=English.lng /product=db10 "iTop VPN Installer B" "IFun Screen Recorder Installer" "iTop PDF Installer"5⤵
- Executes dropped EXE
- Checks computer location settings
PID:5904 -
C:\ProgramData\IObit\Driver Booster\Downloader\db10\iTopSetup.exe"C:\ProgramData\IObit\Driver Booster\Downloader\db10\iTopSetup.exe" /sp- /verysilent /suppressmsgboxes /norestart /insur=db_in_fre6⤵
- Executes dropped EXE
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\is-J565K.tmp\iTopSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-J565K.tmp\iTopSetup.tmp" /SL5="$40436,26434005,141312,C:\ProgramData\IObit\Driver Booster\Downloader\db10\iTopSetup.exe" /sp- /verysilent /suppressmsgboxes /norestart /insur=db_in_fre7⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\is-SQRBO.tmp\ugin.exe"C:\Users\Admin\AppData\Local\Temp\is-SQRBO.tmp\ugin.exe" /kill /UPGRADE8⤵PID:6748
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /f /im "ugin.exe"8⤵
- Kills process with taskkill
PID:6400
-
-
C:\Program Files (x86)\iTop VPN\ugin.exe"C:\Program Files (x86)\iTop VPN\ugin.exe" /kill /updagrade8⤵PID:4060
-
-
C:\Program Files (x86)\iTop VPN\ugin.exe"C:\Program Files (x86)\iTop VPN\ugin.exe" /init /ver 4.2.0.3790 /force /f /inspkg "C:\ProgramData\IObit\Driver Booster\Downloader\db10\iTopSetup.exe" /insur "db_in_fre" /PINTOTASKBAR8⤵
- Checks computer location settings
- Drops file in Program Files directory
PID:5384 -
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop windivert9⤵PID:6884
-
C:\Windows\SysWOW64\sc.exesc stop windivert10⤵
- Launches sc.exe
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop windivert9⤵PID:5856
-
C:\Windows\SysWOW64\sc.exesc stop windivert10⤵
- Launches sc.exe
PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete windivert9⤵PID:4968
-
C:\Windows\SysWOW64\sc.exesc delete windivert10⤵
- Launches sc.exe
PID:912
-
-
-
C:\Program Files (x86)\iTop VPN\icop64.exe"C:\Program Files (x86)\iTop VPN\icop64.exe" Pin "C:\Program Files (x86)\iTop VPN\iTopVPN.exe"9⤵PID:5952
-
-
C:\Program Files (x86)\iTop VPN\ugin.exe"C:\Program Files (x86)\iTop VPN\ugin.exe" /checkwelcome9⤵PID:4188
-
-
-
C:\Program Files (x86)\iTop VPN\iTopVPN.exe"C:\Program Files (x86)\iTop VPN\iTopVPN.exe" /installinit8⤵PID:3880
-
-
C:\Program Files (x86)\iTop VPN\ullc.exe"C:\Program Files (x86)\iTop VPN\ullc.exe"8⤵PID:5968
-
-
C:\Program Files (x86)\iTop VPN\ugin.exe"C:\Program Files (x86)\iTop VPN\ugin.exe" /setlan "English"8⤵PID:5528
-
-
C:\Program Files (x86)\iTop VPN\unpr.exe"C:\Program Files (x86)\iTop VPN\unpr.exe" /install itop48⤵PID:5752
-
-
C:\Program Files (x86)\iTop VPN\iTopVPN.exe"C:\Program Files (x86)\iTop VPN\iTopVPN.exe" /install8⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:5228 -
C:\Program Files (x86)\iTop VPN\aud.exe"C:\Program Files (x86)\iTop VPN\aud.exe" /u https://stats.itopvpn.com/active_month.php /a itop4 /p itopf /v 4.2.0.3790 /t 10 /d 7 / /user9⤵PID:1248
-
-
C:\Program Files (x86)\iTop VPN\aud.exe"C:\Program Files (x86)\iTop VPN\aud.exe" /itop /dayactive9⤵PID:6076
-
-
C:\Program Files (x86)\iTop VPN\atud.exe"C:\Program Files (x86)\iTop VPN\atud.exe" /auto9⤵
- Checks computer location settings
PID:4120 -
C:\Program Files (x86)\iTop VPN\Pub\itopbf.exe"C:\Program Files (x86)\iTop VPN\Pub\itopbf.exe" /vpn10⤵PID:6748
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /flushdns9⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns10⤵
- Gathers network information
PID:6988
-
-
-
C:\Program Files (x86)\iTop VPN\iTopVPNMini.exe"C:\Program Files (x86)\iTop VPN\iTopVPNMini.exe" /antrun /install /state 09⤵PID:6064
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop itvwd9⤵PID:6072
-
C:\Windows\SysWOW64\sc.exesc stop itvwd10⤵
- Launches sc.exe
PID:4956
-
-
-
C:\Windows\SYSTEM32\secedit.exesecedit /export /cfg C:\Users\Admin\AppData\Local\Temp\5512.inf /log C:\Users\Admin\AppData\Local\Temp\753.log9⤵PID:5396
-
-
C:\Windows\SYSTEM32\secedit.exesecedit /export /cfg C:\Users\Admin\AppData\Local\Temp\4166.inf /log C:\Users\Admin\AppData\Local\Temp\3458.log9⤵PID:5356
-
-
C:\Windows\SysWOW64\sc.exesc start MpsSvc9⤵
- Launches sc.exe
PID:5420
-
-
C:\Windows\SysWOW64\sc.exesc start MpsSvc9⤵
- Launches sc.exe
PID:5576
-
-
C:\Windows\SysWOW64\sc.exesc start MpsSvc9⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\SysWOW64\sc.exesc start MpsSvc9⤵
- Launches sc.exe
PID:3832
-
-
-
C:\Program Files (x86)\iTop VPN\ugin.exe"C:\Program Files (x86)\iTop VPN\ugin.exe" /combinslog "C:\Users\Admin\AppData\Local\Temp\Setup Log 2022-11-19 #004.txt"8⤵PID:2864
-
-
-
-
C:\ProgramData\IObit\Driver Booster\Downloader\db10\ISRSetup.exe"C:\ProgramData\IObit\Driver Booster\Downloader\db10\ISRSetup.exe" /sp- /verysilent /suppressmsgboxes /NoRestart /insur=db_in6⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\is-V1J5I.tmp\ISRSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-V1J5I.tmp\ISRSetup.tmp" /SL5="$604B6,95546839,228864,C:\ProgramData\IObit\Driver Booster\Downloader\db10\ISRSetup.exe" /sp- /verysilent /suppressmsgboxes /NoRestart /insur=db_in7⤵
- Checks computer location settings
- Drops file in Program Files directory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe"C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe" /CopyOldConfig /installdir=""8⤵PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe"C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe" /CleanReg8⤵PID:6464
-
-
C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe"C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe" /KillProcess /installdir="C:\Program Files\iTop Screen Recorder"8⤵PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe"C:\Users\Admin\AppData\Local\Temp\is-MS54H.tmp\iScrInit.exe" /DeleteAllFile /reinstall=1 /installdir="C:\Program Files\iTop Screen Recorder"8⤵PID:3812
-
-
C:\Program Files\iTop Screen Recorder\LocalLang.exe"C:\Program Files\iTop Screen Recorder\LocalLang.exe"8⤵PID:5716
-
-
C:\Program Files\iTop Screen Recorder\iScrInit.exe"C:\Program Files\iTop Screen Recorder\iScrInit.exe" /reinstall=0 /insur=db_in /SetupFile="C:\ProgramData\IObit\Driver Booster\Downloader\db10\ISRSetup.exe"8⤵PID:7016
-
-
C:\Program Files\iTop Screen Recorder\iScrInit.exe"C:\Program Files\iTop Screen Recorder\iScrInit.exe" /install8⤵
- Checks computer location settings
PID:3616 -
C:\Program Files\iTop Screen Recorder\GpuCheck.exe"C:\Program Files\iTop Screen Recorder\GpuCheck.exe" /GpuCheck9⤵
- Checks SCSI registry key(s)
PID:3744
-
-
-
C:\Program Files\iTop Screen Recorder\iScrInit.exe"C:\Program Files\iTop Screen Recorder\iScrInit.exe" /pin=08⤵PID:5788
-
-
C:\Program Files\iTop Screen Recorder\UninstallInfo.exe"C:\Program Files\iTop Screen Recorder\UninstallInfo.exe" /install isr38⤵PID:6660
-
-
C:\Program Files\iTop Screen Recorder\iScrInit.exe"C:\Program Files\iTop Screen Recorder\iScrInit.exe" /PostSystemInfo8⤵
- Checks computer location settings
PID:4476
-
-
C:\Program Files\iTop Screen Recorder\iScrRec.exe"C:\Program Files\iTop Screen Recorder\iScrRec.exe"8⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4876 -
C:\Program Files\iTop Screen Recorder\GpuCheck.exe"C:\Program Files\iTop Screen Recorder\GpuCheck.exe" /GpuCheck9⤵
- Executes dropped EXE
PID:5616
-
-
C:\Program Files\iTop Screen Recorder\graphics-check.exe"C:\Program Files\iTop Screen Recorder\graphics-check.exe"9⤵PID:5912
-
-
C:\Program Files\iTop Screen Recorder\AutoUpdate.exe"C:\Program Files\iTop Screen Recorder\AutoUpdate.exe" /auto /start9⤵PID:5736
-
C:\Program Files\iTop Screen Recorder\iScrInit.exe"C:\Program Files\iTop Screen Recorder\iScrInit.exe" /AutoupdateUac10⤵PID:6268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Schtasks /run /tn "iTop Screen Recorder UAC"9⤵PID:7004
-
C:\Windows\system32\schtasks.exeSchtasks /run /tn "iTop Screen Recorder UAC"10⤵PID:6000
-
-
-
C:\Program Files\iTop Screen Recorder\get-graphics-offsets32.exe"C:\Program Files\iTop Screen Recorder\get-graphics-offsets32.exe" /main9⤵PID:3472
-
-
C:\Program Files\iTop Screen Recorder\get-graphics-offsets64.exe"C:\Program Files\iTop Screen Recorder\get-graphics-offsets64.exe" /main9⤵PID:4292
-
-
C:\Program Files\iTop Screen Recorder\iScrPaint.exe"C:\Program Files\iTop Screen Recorder\iScrPaint.exe" /hwnd 524846 /rect 0 0 1280 720 /needscale 0 /shape 1 /color 1 /recordprotec 09⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 91610⤵
- Program crash
PID:6148
-
-
-
-
-
-
C:\ProgramData\IObit\Driver Booster\Downloader\db10\PDFSetup.exe"C:\ProgramData\IObit\Driver Booster\Downloader\db10\PDFSetup.exe" /sp- /verysilent /suppressmsgboxes /insur=db_inw6⤵PID:6140
-
C:\Users\Admin\AppData\Local\Temp\is-U0N30.tmp\PDFSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-U0N30.tmp\PDFSetup.tmp" /SL5="$405A2,163617026,199680,C:\ProgramData\IObit\Driver Booster\Downloader\db10\PDFSetup.exe" /sp- /verysilent /suppressmsgboxes /insur=db_inw7⤵
- Checks computer location settings
- Drops file in Program Files directory
PID:1972 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im iTopPDF.exe8⤵
- Kills process with taskkill
PID:1656
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im Launcher.exe8⤵
- Kills process with taskkill
PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im AutoUpdate.exe8⤵
- Kills process with taskkill
PID:6184
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im AUpdate.exe8⤵
- Kills process with taskkill
PID:5212
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /u /s "C:\Program Files\iTop PDF\PDFShellExtension.dll"8⤵PID:1636
-
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /deletefile8⤵PID:1784
-
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /pintaskbar /lastversion=8⤵PID:7064
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\iTop PDF\PDFShellExtension.dll"8⤵
- Modifies system executable filetype association
- Modifies registry class
PID:1868
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im iTopPDF.exe8⤵
- Kills process with taskkill
PID:1356
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im Launcher.exe8⤵
- Kills process with taskkill
PID:3988
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im AutoUpdate.exe8⤵
- Kills process with taskkill
PID:4396
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" -f -im AUpdate.exe8⤵
- Kills process with taskkill
PID:5372
-
-
C:\Program Files\iTop PDF\LocalLang.exe"C:\Program Files\iTop PDF\LocalLang.exe"8⤵PID:1192
-
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /recordver8⤵PID:6196
-
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /reinstall=0 /Language=English /insur=db_inw8⤵PID:4308
-
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /install /lastversion=8⤵
- Modifies registry class
PID:5140
-
-
C:\Program Files\iTop PDF\ICONPIN64.exe"C:\Program Files\iTop PDF\ICONPIN64.exe" Pin "C:\Program Files\iTop PDF\Launcher.exe"8⤵PID:6348
-
-
C:\Program Files\iTop PDF\UninstallInfo.exe"C:\Program Files\iTop PDF\UninstallInfo.exe" /install pdf38⤵PID:3992
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe"8⤵
- Checks computer location settings
PID:7164 -
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Roaming\iTop PDF" /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\iTop PDF\Crashpad" --url=https://f.a.k/e "--annotation=_productName=iTop PDF" --annotation=_version=3.1.0-26 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=19.0.17 --initial-client-data=0x468,0x470,0x474,0x464,0x478,0x7ff7a2e94270,0x7ff7a2e94280,0x7ff7a2e942909⤵PID:1324
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:29⤵PID:5772
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2084 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:89⤵PID:5812
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2324 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵
- Checks computer location settings
PID:6096 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"10⤵PID:6732
-
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid11⤵PID:904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp 65001|powershell -command "chcp 65001|Out-Null;Add-Type -AssemblyName PresentationCore;$families=[Windows.Media.Fonts]::SystemFontFamilies;foreach($family in $families){$name='';if(!$family.FamilyNames.TryGetValue([Windows.Markup.XmlLanguage]::GetLanguage('zh-cn'),[ref]$name)){$name=$family.FamilyNames[[Windows.Markup.XmlLanguage]::GetLanguage('en-us')]}echo $name}""10⤵PID:3880
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:6348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "chcp 65001|Out-Null;Add-Type -AssemblyName PresentationCore;$families=[Windows.Media.Fonts]::SystemFontFamilies;foreach($family in $families){$name='';if(!$family.FamilyNames.TryGetValue([Windows.Markup.XmlLanguage]::GetLanguage('zh-cn'),[ref]$name)){$name=$family.FamilyNames[[Windows.Markup.XmlLanguage]::GetLanguage('en-us')]}echo $name}"11⤵PID:6492
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 6500112⤵PID:4696
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b100 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce"10⤵PID:6764
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b100 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce11⤵PID:3704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a100 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 0"10⤵PID:4528
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a100 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 011⤵
- Executes dropped EXE
PID:4236
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\PDFInit.exe" /createuactask"9⤵PID:6788
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /createuactask10⤵PID:1656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\PDFInit.exe" /correctautask /createexprttask"9⤵PID:6008
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /correctautask /createexprttask10⤵PID:4352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\AutoUpdate.exe" /main"9⤵PID:4704
-
C:\Program Files\iTop PDF\AutoUpdate.exe"C:\Program Files\iTop PDF\AutoUpdate.exe" /main10⤵PID:4196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\AUpdate.exe" /pdf /dayactive"9⤵PID:4696
-
C:\Program Files\iTop PDF\AUpdate.exe"C:\Program Files\iTop PDF\AUpdate.exe" /pdf /dayactive10⤵PID:4336
-
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵
- Checks computer location settings
PID:1896 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"10⤵PID:1924
-
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid11⤵PID:7152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp 65001|powershell -command "chcp 65001|Out-Null;Add-Type -AssemblyName PresentationCore;$families=[Windows.Media.Fonts]::SystemFontFamilies;foreach($family in $families){$name='';if(!$family.FamilyNames.TryGetValue([Windows.Markup.XmlLanguage]::GetLanguage('zh-cn'),[ref]$name)){$name=$family.FamilyNames[[Windows.Markup.XmlLanguage]::GetLanguage('en-us')]}echo $name}""10⤵PID:5212
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "chcp 65001|Out-Null;Add-Type -AssemblyName PresentationCore;$families=[Windows.Media.Fonts]::SystemFontFamilies;foreach($family in $families){$name='';if(!$family.FamilyNames.TryGetValue([Windows.Markup.XmlLanguage]::GetLanguage('zh-cn'),[ref]$name)){$name=$family.FamilyNames[[Windows.Markup.XmlLanguage]::GetLanguage('en-us')]}echo $name}"11⤵PID:1580
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 6500112⤵PID:7004
-
-
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b100 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce"10⤵PID:3788
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b100 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce11⤵PID:4904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b619 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce /postnow"10⤵PID:7084
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b619 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce /postnow11⤵PID:6148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a619 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 0 /postnow"10⤵PID:4128
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a619 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 0 /postnow11⤵PID:856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a100 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 0"10⤵PID:7040
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a100 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 011⤵PID:5340
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b600 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce /postnow"9⤵PID:6016
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag b600 /type 10 /url http://stats.itopvpn.com/iusage.php /dyonce /postnow10⤵
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a600 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 0 /postnow"9⤵PID:6000
-
C:\Program Files\iTop PDF\ProductStat.exe"C:\Program Files\iTop PDF\ProductStat.exe" /cachepath "C:\Users\Admin\AppData\Roaming\iTop PDF\Data" /appid pdf3 /pr itop /ver 3.1.0.26 /stflag a600 /type 10 /url http://stats.itopvpn.com/iusage.php /dycus 0 /postnow10⤵PID:5356
-
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --enable-blink-features --disable-blink-features --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=3416 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵PID:1096
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --enable-blink-features --disable-blink-features --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3428 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵PID:3712
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --enable-blink-features --disable-blink-features --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --mojo-platform-channel-handle=3464 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵
- Executes dropped EXE
- Checks computer location settings
PID:4948
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --enable-blink-features --disable-blink-features --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=3452 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵
- Checks computer location settings
PID:6580
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --enable-blink-features --disable-blink-features --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=3676 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵
- Checks computer location settings
PID:6268
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Program Files\iTop PDF\resources\app" --no-sandbox --no-zygote --enable-blink-features --disable-blink-features --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=3632 --field-trial-handle=1808,i,14904980365576408756,3507533383604678588,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:19⤵PID:4704
-
-
-
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks processor information in registry
PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82e9c4f50,0x7ff82e9c4f60,0x7ff82e9c4f703⤵PID:6636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1792 /prefetch:83⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2996 /prefetch:83⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:13⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:13⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1744 /prefetch:23⤵PID:6640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:13⤵PID:6436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:13⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4508 /prefetch:83⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4692 /prefetch:83⤵
- Checks SCSI registry key(s)
PID:6632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4972 /prefetch:83⤵PID:5248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4936 /prefetch:83⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:83⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:83⤵PID:7164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:13⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵PID:6480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1076 /prefetch:13⤵PID:5136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:13⤵PID:5676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,7109973046170700511,14150062818725089446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3496 /prefetch:83⤵PID:5404
-
-
-
C:\Program Files\iTop PDF\Launcher.exe"C:\Program Files\iTop PDF\Launcher.exe"2⤵PID:6204
-
C:\Windows\SysWOW64\cmd.execmd.exe /C iTopPDF.exe3⤵PID:5096
-
C:\Program Files\iTop PDF\iTopPDF.exeiTopPDF.exe4⤵PID:6012
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Roaming\iTop PDF" /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\iTop PDF\Crashpad" --url=https://f.a.k/e "--annotation=_productName=iTop PDF" --annotation=_version=3.1.0-26 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=19.0.17 --initial-client-data=0x4a4,0x4a8,0x4ac,0x4a0,0x494,0x7ff7a2e94270,0x7ff7a2e94280,0x7ff7a2e942905⤵
- Checks SCSI registry key(s)
PID:6036
-
-
C:\Program Files\iTop PDF\iTopPDF.exe"C:\Program Files\iTop PDF\iTopPDF.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\iTop PDF" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1812,i,17205615237908686099,9129662640389527462,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:25⤵PID:2004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Program Files\iTop PDF\PDFInit.exe" /createuactask"5⤵PID:1888
-
C:\Program Files\iTop PDF\PDFInit.exe"C:\Program Files\iTop PDF\PDFInit.exe" /createuactask6⤵PID:3856
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:5832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff82df14f50,0x7ff82df14f60,0x7ff82df14f703⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2012 /prefetch:83⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1644 /prefetch:23⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2492 /prefetch:83⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:13⤵PID:6244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:13⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:13⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:6420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4556 /prefetch:83⤵PID:6344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4696 /prefetch:83⤵
- Suspicious use of SetWindowsHookEx
PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4820 /prefetch:83⤵PID:7056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4944 /prefetch:83⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5108 /prefetch:83⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:13⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 /prefetch:83⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 /prefetch:83⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:13⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:13⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1692 /prefetch:13⤵PID:7108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:83⤵PID:6380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:83⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:13⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5488 /prefetch:83⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5512 /prefetch:83⤵PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:83⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:83⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:83⤵PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:13⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4776 /prefetch:83⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5976 /prefetch:83⤵PID:6748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6060 /prefetch:83⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:13⤵PID:5912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:13⤵PID:5372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:13⤵PID:6068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:13⤵PID:5556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:13⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:13⤵PID:5600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2320 /prefetch:13⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:13⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:13⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5980 /prefetch:83⤵PID:6732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6180 /prefetch:83⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6096 /prefetch:23⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3232 /prefetch:83⤵PID:5736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5672 /prefetch:83⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 /prefetch:83⤵PID:6616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1384 /prefetch:83⤵PID:6184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,15358341706416814073,5729005099134023850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6176 /prefetch:83⤵PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"2⤵
- Modifies system executable filetype association
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Modifies registry class
PID:2976
-
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"2⤵
- Drops startup file
PID:1284 -
C:\Windows\SysWOW64\attrib.exeattrib +h .3⤵
- Views/modifies file attributes
PID:4492
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
PID:4792
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe3⤵PID:4024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 130131668866368.bat3⤵PID:4820
-
-
C:\Users\Admin\Desktop\@[email protected]PID:5372
-
C:\Users\Admin\Desktop\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe4⤵PID:3756
-
-
-
C:\Windows\SysWOW64\cmd.exePID:5604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4424
-
-
C:\Users\Admin\Desktop\@[email protected]PID:4324
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet5⤵PID:6808
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete6⤵PID:2712
-
-
-
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe3⤵PID:6156
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "zywnfqwizjcp627" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f3⤵PID:5492
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "zywnfqwizjcp627" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f4⤵
- Modifies registry key
PID:2188
-
-
-
C:\Users\Admin\Desktop\@[email protected]PID:3064
-
-
C:\Users\Admin\Desktop\taskse.exePID:3828
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe3⤵PID:6916
-
-
C:\Users\Admin\Desktop\@[email protected]PID:6824
-
-
C:\Users\Admin\Desktop\taskse.exePID:5744
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe3⤵PID:6176
-
-
C:\Users\Admin\Desktop\taskse.exePID:2612
-
-
C:\Users\Admin\Desktop\@[email protected]PID:6004
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe3⤵PID:5492
-
-
C:\Users\Admin\Desktop\taskse.exePID:1928
-
-
C:\Users\Admin\Desktop\@[email protected]PID:6436
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe3⤵PID:6004
-
-
C:\Users\Admin\Desktop\@[email protected]PID:2932
-
-
C:\Users\Admin\Desktop\taskse.exePID:2612
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe3⤵PID:5764
-
-
C:\Users\Admin\Desktop\@[email protected]PID:3984
-
-
C:\Users\Admin\Desktop\taskse.exePID:5644
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4564 -ip 45641⤵PID:3840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
-
C:\Users\Admin\AppData\Roaming\vwfcehvC:\Users\Admin\AppData\Roaming\vwfcehv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7004
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1256
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
- Loads dropped DLL
- Checks processor information in registry
PID:4856 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows mail\cloud_icon.dll",YA9RMXE=2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:6908
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:7144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:5952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
-
C:\Program Files\iTop Screen Recorder\iScrInit.exe"C:\Program Files\iTop Screen Recorder\iScrInit.exe" /UAC1⤵
- Checks computer location settings
PID:4444 -
C:\Program Files\iTop Screen Recorder\AUpdate.exe"C:\Program Files\iTop Screen Recorder\AUpdate.exe" /u http://stats.itopvpn.com/iactive_month.php /a isr3 /p itop /v 3.2.0.1168 /t 1 /d 72⤵PID:5440
-
-
C:\Program Files\iTop Screen Recorder\AUpdate.exe"C:\Program Files\iTop Screen Recorder\AUpdate.exe" /isr /dayactive2⤵
- Suspicious use of SetWindowsHookEx
PID:4356
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x308 0x4cc1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6332
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5992 -ip 59921⤵PID:7148
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Executes dropped EXE
PID:6452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:7016
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:6012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc1⤵PID:4696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:6348
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3704
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵PID:6220
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir6220_1936316300\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir6220_1936316300\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={cafb396e-0b4a-410e-90bb-e04feeee65aa} --system2⤵PID:6184
-
-
C:\Users\Admin\AppData\Roaming\vwfcehvC:\Users\Admin\AppData\Roaming\vwfcehv1⤵PID:5660
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6452
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
5Defense Evasion
File Deletion
1File and Directory Permissions Modification
1Hidden Files and Directories
1Impair Defenses
1Install Root Certificate
1Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD52141e916c95cfa9ad154136321e16bab
SHA1e5eca565f7d6e04aacb92e2d334f0dbf39c799b0
SHA256dadff5e5eaa502c91cf8cc77b20dbd3b166efcf1f4f39536d98e73121895d275
SHA5120b59ccda76d76ab5142273153d4a57bbd8eb112b3d2c46d08448113fb0fb178c5927d5855d33e43dc3376c9196dde6c924bbf021b914363c2d7e2f931b2c07a7
-
Filesize
40B
MD52141e916c95cfa9ad154136321e16bab
SHA1e5eca565f7d6e04aacb92e2d334f0dbf39c799b0
SHA256dadff5e5eaa502c91cf8cc77b20dbd3b166efcf1f4f39536d98e73121895d275
SHA5120b59ccda76d76ab5142273153d4a57bbd8eb112b3d2c46d08448113fb0fb178c5927d5855d33e43dc3376c9196dde6c924bbf021b914363c2d7e2f931b2c07a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
Filesize10KB
MD590f880064a42b29ccff51fe5425bf1a3
SHA16a3cae3996e9fff653a1ddf731ced32b2be2acbf
SHA256965203d541e442c107dbc6d5b395168123d0397559774beae4e5b9abc44ef268
SHA512d9cbfcd865356f19a57954f8fd952caf3d31b354112766c41892d1ef40bd2533682d4ec3f4da0e59a5397364f67a484b45091ba94e6c69ed18ab681403dfd3f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\verified_contents.json
Filesize7KB
MD50834821960cb5c6e9d477aef649cb2e4
SHA17d25f027d7cee9e94e9cbdee1f9220c8d20a1588
SHA25652a24fa2fb3bcb18d9d8571ae385c4a830ff98ce4c18384d40a84ea7f6ba7f69
SHA5129aeafc3ece295678242d81d71804e370900a6d4c6a618c5a81cacd869b84346feac92189e01718a7bb5c8226e9be88b063d2ece7cb0c84f17bb1af3c5b1a3fc4
-
Filesize
28KB
MD53b0c359be60d5111473cbb9106955b34
SHA1d4c32e30de5f17946cd501fa5e2661d27dceb0c9
SHA256b466710bf666877c6e854887d56e7be236a5ebaba19ab024725be00d5d8ddf3e
SHA5124002c190dc8736417319ba5e7bf0207c5e22cc71dd655b50e57ba3cfc066f6452af1e1b37f1ea7d68ae224ccbf15691de9251f577d61de43cdbb60f5fdb0c828
-
Filesize
116KB
MD553518ca2fef85234cc8eeb98d94f295f
SHA17e29cc19d9109ff4343d3dcde286e475767fe6de
SHA256bcdc9287a2a615720a13f11441764b8b684207be441ae2c9853975235a542151
SHA512261b5cc9d2974428b941cff62e99681fc40d3495bf22026d9b9f8fefcaf0ed22b04e7c85f41ed5f87ef1d689a12e0f542baddfd849630484697e3789ed84a15c
-
Filesize
329B
MD55ec64a9aa9ba6e13d99461dca531f690
SHA1ed8817da86ef37ac0d1d2dec107d5be212ff758c
SHA2560890b3533e3c1fd7e798493ec472b89b29e1747429faefb82264d28f57b3454c
SHA51259e8d4b0b10ca82ec4ee3e041a09d7fbfec8327b26e9b2479101e4f31ca0cad27976d9368504bb41ebb0d47912c8e92b440c4d72b5df5cf23810c0690420916f
-
Filesize
6KB
MD5c2040f0ac8c2811da8e40e2bf2e025d9
SHA17528ded7d83344606efbd07ff8063c157682e929
SHA256d76bee7d5c5559accc75b58a026f2141bf7768884bd30b1d7803ce22b2d54875
SHA512548171da5bf06348c354dc18943b4a43d4695edbbd77e0a4cb95f897cdb5d393d3f2a802b9fc433f1ce0cfdb32009baf92cf681f47c171329c307eb3c27c2b79
-
Filesize
17KB
MD55d127f537d1e778fe2bca76986bcaff8
SHA1b50bf984b9406b3ee07861973001a2315cf5917a
SHA25642493ec4d87c4653f6d5f211f44b81da88046ae2f7a333389d8aa195a3d9c846
SHA5121a5be90ac143d342133e2dd1e7a8cd99b1323894358de0e0312dce1192ccdf2841723633c6569e8963d5b47eba03945ffcd1d4fa71c61776b496329a5f4c91c6
-
Filesize
36KB
MD5597412bce4a16c0e74f56e2ae31e504d
SHA1b99697f4f4fa45e39851209f4a5125b651c7f463
SHA25680721a884fc0399804976f5a862c82c763612de19cb151d0222fb5229d1b3651
SHA512bdcc532d58a2a98c65d612334f99caec127c103cb70554dc706f0761139ea8485ee73abafef239d0666702021977b5256164b425753e7ec1a7ebbd367e177478
-
Filesize
8KB
MD5226b5dde153d7ead28b5bbd1284e3be9
SHA108ea59dfe1a37c2a8e8dacbbe858dc509a0d054d
SHA256bf6291bb98656889cede938a512c2f4cfc611f3b18b2c21ebc7acaff3553af25
SHA5124d483a86058186580a11c90299c31a48323e3945d51683745d8138128e131a92da1b509727b5532297ca0ee32ded51047e49bc91074d4a306e8c143d90ab36ee
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000003.log
Filesize184B
MD532afd00f3ece9f8daa87c8998dd39969
SHA178b3407558ac787b6af1d682417d9257b5b3a90b
SHA256062cd71b84c6814c75e5ed9c1502e603b157bbe201333365fbe2ee197eee1104
SHA5126af99f6a047891f4914f3b54a27b591ba7b65385c1140d0324e0ad1da7e30abe05955e1441c03096418d5c5917d0c54c42a3f5a70aed4fdf8e5dc195fb3a4a29
-
Filesize
345B
MD5f0f3f27712f5070fbf11f6e28f21a048
SHA14ceba2f4438bdfb3a6481cde7689e4441cb4a963
SHA256b6725cb5c58fa872c2ea4fb0279075c868068227e8215779d2215495acea653a
SHA512a8fce49c0cf86927a26442cca674765adfab922681c1cf5e9efafa82ee5a0d461b5780e39ed7d5a8966838f601fefc9d7446d4a78e6009ec3a595d73dc166d10
-
Filesize
160B
MD5de92ad90be6d3364745b2f73f4c3cf73
SHA19158681463bd30e5af4dda4baac81f93cedbda77
SHA2560025a3e0d3b834401b3b5f820e1991ef7e810d9a4b8b6b579e6301c94e7031a0
SHA5129e81cefc195439439f4b23ee7696309d7bc3c08e5b444d2abde26d2f12b2d3bcfd124fb9a2d40c6389e9f787741676fad366a2e9982674e7b931028c014d8a79
-
Filesize
321B
MD52beec767ec18f9d27cfc7e377c60aa7b
SHA1d86fc58a302ef2a595919519d79da5ea95e0f6be
SHA2566b2f555e83be563e4bebe95828a37225feeb14766f62a7174303d73d487e1b6e
SHA51268a4f11dd862a6fe4ea2a765bfc60675dc7a6766a628112414444ee2e525f9f00b3b8b53d7a43869ee4c26faf4b504e6e121ed099300e53b54e880620a6b5b53
-
Filesize
128KB
MD59014570112a4639039a24438e0f6f265
SHA1edac8b2b44bd35a57b38ad9b04ee8967ffb1e3bb
SHA256502f9b98790bb3bf6803d1044e35b8985e372b051f284ec8726fb333c5f039e2
SHA512be6de37c7e6f403cf1d96773698ba5ba9cb541692d306cc107b4b2a46181e130ce3132dea8b3cc802a6fbcd0274b507f0e82b1c5f5488605e5707ecd31eba022
-
Filesize
88KB
MD5f1ce8111251b0b0afdfc85ce3d1ca626
SHA18630b4d960e48d9f01e0eb474681f3d75a67219b
SHA25649a6f39eda6bfa316090a50e9aad40cfe8ab78ce10bdb4611866937c20d1707a
SHA5126c65ebb90a005b8a174d09eae02fa0b53f141c0bc98ab777f6465d18564001b41a440bdf1d76b04d93f4682051c4c93bd4b039281833ba1fd53133f010f90c13
-
Filesize
13B
MD5b63048c4e7e52c52053d25da30d9c5ab
SHA1679a44d402f5ec24605719e06459f5a707989187
SHA256389caa40ea458e84bc624a9af1e0dec60fa652b2db2b81c09b1dfe22822cc3d1
SHA512e86c58c5a25e24f21ad79ed526a90c120a09c115f4820663bd2ebbc59e7bb1c4c418267eb77645522aa20b2c1b53fba8e31690db7bae9b21e4eff3db06316359
-
Filesize
103KB
MD5f3ea0e0100eb87f807f118df453805ad
SHA14ed64fdd9b478bbcaace80f8db734ce6d9732b3c
SHA25665dfba4d9354756030aeb868204692f6d8a682b7799dbb18b88dab40ff61233f
SHA512cdff7ab5d442b352507ad38593772e03ff58f290bcdf4e6eddf748a71abc9a5c2caf25eda3e3593abe63df0ac790c68aebee5595bcf73ece7edab006486ebb6b
-
Filesize
103KB
MD51da3d13165c7d3536ac48fea221692c9
SHA16dcaf5c71a7f91abafe94fc2b6049f2414d0d07e
SHA256bebfc5d42c160f11bee0fd049e8c8f42f81f2fb460b8dc919e93fc65aa947cce
SHA512a39e80d680239eab7cc23e9315c41afb64763154766ae3eabcc4315e1ae68cbcdc93a36662e6b226ab516202a63a81b18f084a794afbbbfac5323853f03971c9
-
Filesize
1.1MB
MD51e128c8d4692ee6fc5817f61e3acf6cf
SHA150c6ca5e5b0cf70ef534124495bd93063708a060
SHA2563a3e054f3a6902fe31c8fe8854d67cc3f2ddcd34b2c6c52a06a925c41e86125b
SHA512ced518530ba380dec2e7737286a14e24d15db808f126f43637145031e56941964a726737e94fa8d973351aea4c64a7333f88e17bdf7fc0afd6905d593c1d5314
-
Filesize
1.1MB
MD51e128c8d4692ee6fc5817f61e3acf6cf
SHA150c6ca5e5b0cf70ef534124495bd93063708a060
SHA2563a3e054f3a6902fe31c8fe8854d67cc3f2ddcd34b2c6c52a06a925c41e86125b
SHA512ced518530ba380dec2e7737286a14e24d15db808f126f43637145031e56941964a726737e94fa8d973351aea4c64a7333f88e17bdf7fc0afd6905d593c1d5314
-
Filesize
752KB
MD5ad4fe6dd11eca5f7254e0e00ed47d984
SHA1e809de0322d74dd4642f215f46f22b3a9b7caa21
SHA2566ecc725eab418e27d8fa2f1031fce6bc119d677b8d72e0447050a87489e8e0ca
SHA512d09f4f9a94f34fe1a6f5fe78ec32e91026fe07263183d4d41c4a51cfa7ee5fbc1b38d2ebeda20a717a2a730af011d73d113decb3ae2fe9db50530c095cf33ea3
-
Filesize
752KB
MD5ad4fe6dd11eca5f7254e0e00ed47d984
SHA1e809de0322d74dd4642f215f46f22b3a9b7caa21
SHA2566ecc725eab418e27d8fa2f1031fce6bc119d677b8d72e0447050a87489e8e0ca
SHA512d09f4f9a94f34fe1a6f5fe78ec32e91026fe07263183d4d41c4a51cfa7ee5fbc1b38d2ebeda20a717a2a730af011d73d113decb3ae2fe9db50530c095cf33ea3
-
Filesize
3.0MB
MD5104684b539640daef74e717e02abcf98
SHA13dbe093bbe92ab27c23610795358a763eab1b11b
SHA256c46d28f68af133e26dcb5f60564e4e31896c7917b68baf5d0c11fc2dd5bad7f3
SHA5123eaa956d34ec3d98fcb9cb28a08d8832314140f0ac9f7e3266a75831ea7e99041090fd98ff69a221ce8a0a5615767b34cd3555c182d069e3a1bbd02e1a5e54c1
-
Filesize
2KB
MD5ac6e68d7bd044284c3c242888155365a
SHA163d6005504dc269f5f279053614861a068f2c924
SHA256b6f41ff464f1baa1bc276e5f46d3be49fed71fe0b490c1bcd401869b9b8df56a
SHA51264a4325c1c22b771532ec0be4a973064b3c98d401475f93acc515a1b70238652dc47bd76754695d8ca9fa76b3ddeaf8f2abbfeb17d5566bea439c8e6bad04d10
-
Filesize
27B
MD5c774ee6f456444fcadd09dc5e27a501b
SHA13b49a20623ff5968b24dac1bcd1a57125e111341
SHA256d3477d17f918bc82462191dee88fe57f25d19173a8361d94580e2dfae3b503df
SHA512a2b8f0ce3dd8b3c9d7e1bd468953eb4a03f0f11511cf65531497056d7ad9a8134d628cf1e1a5e2baafbe05a1a47ffa4673d1fcdc915e7aa9e7da12de4644674d
-
Filesize
1.6MB
MD59a072b31cdd243f970d9904e4a3ca8b2
SHA183ba63619ebac80f0326d42eadb469d2d21de4e4
SHA256d189921d4776bbeadfbea8722738bfbd179c5fc402eaa9676544183aeaf153a2
SHA51217f3f9e73bae21a4d7501387738792b87bde4528e4b5202ca778e97cb3d056c0c1981edea0a01970518f80eef5f6e3a3bf8d014c733ad93f3276233c48fa667b
-
Filesize
1.6MB
MD59a072b31cdd243f970d9904e4a3ca8b2
SHA183ba63619ebac80f0326d42eadb469d2d21de4e4
SHA256d189921d4776bbeadfbea8722738bfbd179c5fc402eaa9676544183aeaf153a2
SHA51217f3f9e73bae21a4d7501387738792b87bde4528e4b5202ca778e97cb3d056c0c1981edea0a01970518f80eef5f6e3a3bf8d014c733ad93f3276233c48fa667b
-
Filesize
11KB
MD5555a540738693069a61ba7c45b97b4fd
SHA10243a4ed559e18e3c02fe68db46a7584071a9408
SHA256605837c12691b6db0aeca8cb97e5a38f0af477e221824b4e1db38170ee202576
SHA5121a802fdc0c80c4ff349bcd053803a86a7f5ecc1692035f749ca8893b403e3a6e2d7e28295bc2e186d10107a6ec566b571f85765c0a3ab48c46a9dbfb5057ab4c