Analysis
-
max time kernel
335s -
max time network
688s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-es -
resource tags
arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
27-11-2022 16:14
Static task
static1
Behavioral task
behavioral1
Sample
scammer.png
Resource
win10v2004-20220812-es
General
-
Target
scammer.png
-
Size
110KB
-
MD5
ab1b7f8e9d319f0a9ab7a5e09d51176f
-
SHA1
2bb3ba8dc0407c6a80e9c7a7b757dfb33df11801
-
SHA256
1fe5c30f31f8c608a7f068beaf2d654349f2c4b1efb56b17afd0bcd879ee5f0d
-
SHA512
23ef4449936f5efdefa3bcbcf61f5701819a16a9f1e3fa0df0160f74934b8b6251a25fec7688bd13e49f641f612f42bad592218e560afa80d3aadb93a4035fb4
-
SSDEEP
3072:FIMFh5qv/moO9jn/HXEUtyI6SRLcH5EhcH5EDPqCCZD1MLy1M+AJpJ+:FILtYnv0UtyI15c2ciqV51l1mJ7+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
Processes:
RAVAntivirus-installer.exedescription ioc process File created C:\Windows\system32\drivers\ReasonCamFilter.sys RAVAntivirus-installer.exe File created C:\Windows\system32\drivers\rsKernelEngine.sys RAVAntivirus-installer.exe File created C:\Windows\system32\drivers\rsElam.sys RAVAntivirus-installer.exe -
Executes dropped EXE 49 IoCs
Processes:
bearshare525.exeGLBAB72.tmpBearShare.exefrostwire-6.9.10.windows.exefrostwire-6.9.10.windows.tmpfrostwire-6.9.10.windows.exeprod0.exeavg_secure_browser_setup.exe0k4l2t5t.exeRAVAntivirus-installer.exeAVGBrowserUpdateSetup.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exersSyncSvc.exeAVGBrowserUpdate.exersSyncSvc.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserInstaller.exesetup.exesetup.exesetup.exesetup.exeAVGBrowser.exeAVGBrowser.exesetup.exesetup.exeAVGBrowserCrashHandler.exeAVGBrowserCrashHandler64.exersWSC.exersWSC.exersClientSvc.exersClientSvc.exersEngineSvc.exersEngineSvc.exe4hbba5ae.exeConhost.exeHola-Browser-Agreed-Inst-C-Amb3.exeHola-Browser-Agreed-Inst-C-Amb3.exeHola-Setup-x64-1.203.908.exenet_updater64.exeConhost.exersHelper.exeRAVAntivirus.exerasdial.exepid process 2268 bearshare525.exe 1416 GLBAB72.tmp 6032 BearShare.exe 5228 frostwire-6.9.10.windows.exe 5808 frostwire-6.9.10.windows.tmp 6020 frostwire-6.9.10.windows.exe 3840 prod0.exe 1708 avg_secure_browser_setup.exe 5884 0k4l2t5t.exe 3588 RAVAntivirus-installer.exe 5160 AVGBrowserUpdateSetup.exe 4460 AVGBrowserUpdate.exe 4164 AVGBrowserUpdate.exe 5108 rsSyncSvc.exe 5852 AVGBrowserUpdate.exe 4852 rsSyncSvc.exe 1788 AVGBrowserUpdateComRegisterShell64.exe 2496 AVGBrowserUpdateComRegisterShell64.exe 3400 AVGBrowserUpdateComRegisterShell64.exe 5380 AVGBrowserUpdate.exe 5264 AVGBrowserUpdate.exe 4652 AVGBrowserUpdate.exe 3812 AVGBrowserInstaller.exe 3936 setup.exe 5944 setup.exe 1076 setup.exe 2024 setup.exe 3448 AVGBrowser.exe 5344 AVGBrowser.exe 4500 setup.exe 5320 setup.exe 2844 AVGBrowserCrashHandler.exe 1612 AVGBrowserCrashHandler64.exe 3144 rsWSC.exe 6096 rsWSC.exe 1376 rsClientSvc.exe 1420 rsClientSvc.exe 2056 rsEngineSvc.exe 4024 rsEngineSvc.exe 3500 4hbba5ae.exe 5296 Conhost.exe 4604 Hola-Browser-Agreed-Inst-C-Amb3.exe 752 Hola-Browser-Agreed-Inst-C-Amb3.exe 3408 Hola-Setup-x64-1.203.908.exe 2804 net_updater64.exe 1152 Conhost.exe 3228 rsHelper.exe 1392 RAVAntivirus.exe 3852 rasdial.exe -
Modifies Installed Components in the registry 2 TTPs 13 IoCs
Processes:
setup.exeGLBAB72.tmpdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Version = "43,0,0,0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F95E1AF-2620-4f15-BDF9-7FDCE4607E17}\ = "BearShare" GLBAB72.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F95E1AF-2620-4f15-BDF9-7FDCE4607E17}\Version = "5,2,5,1" GLBAB72.tmp Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\ = "AVG Secure Browser" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Localized Name = "AVG Secure Browser" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\StubPath = "\"C:\\Program Files (x86)\\AVG\\Browser\\Application\\107.0.19254.108\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F95E1AF-2620-4f15-BDF9-7FDCE4607E17} GLBAB72.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F95E1AF-2620-4f15-BDF9-7FDCE4607E17}\ComponentID = "BearShare" GLBAB72.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F95E1AF-2620-4f15-BDF9-7FDCE4607E17}\IsInstalled = "1" GLBAB72.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F95E1AF-2620-4f15-BDF9-7FDCE4607E17}\Locale = "EN" GLBAB72.tmp Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982} setup.exe -
Registers COM server for autorun 1 TTPs 23 IoCs
Processes:
AVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exesetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\psmachine_64.dll" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\psmachine_64.dll" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\psmachine_64.dll" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\psmachine_64.dll" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A725D612-7D72-48B8-857A-4777781F415C}\LocalServer32\ = "\"C:\\Program Files (x86)\\AVG\\Browser\\Application\\107.0.19254.108\\notification_helper.exe\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{A725D612-7D72-48B8-857A-4777781F415C}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A725D612-7D72-48B8-857A-4777781F415C}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\AVG\\Browser\\Application\\107.0.19254.108\\notification_helper.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\psmachine_64.dll" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\psmachine_64.dll" AVGBrowserUpdateComRegisterShell64.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
Processes:
AVGBrowserUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe\DisableExceptionChainValidation = "0" AVGBrowserUpdate.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BearShare.exeavg_secure_browser_setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BearShare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate BearShare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion avg_secure_browser_setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion avg_secure_browser_setup.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AVGBrowserUpdate.exeGLBAB72.tmpfrostwire-6.9.10.windows.tmpavg_secure_browser_setup.exeprod0.exeAVGBrowserUpdate.exeAVGBrowser.exeAVGBrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation AVGBrowserUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation GLBAB72.tmp Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation frostwire-6.9.10.windows.tmp Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation avg_secure_browser_setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation prod0.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation AVGBrowserUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation AVGBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation AVGBrowser.exe -
Loads dropped DLL 64 IoCs
Processes:
GLBAB72.tmpregsvr32.exeBearShare.exefrostwire-6.9.10.windows.tmpfrostwire-6.9.10.windows.exeavg_secure_browser_setup.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exepid process 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 3400 regsvr32.exe 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 1416 GLBAB72.tmp 6032 BearShare.exe 5808 frostwire-6.9.10.windows.tmp 5808 frostwire-6.9.10.windows.tmp 5808 frostwire-6.9.10.windows.tmp 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 6020 frostwire-6.9.10.windows.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 4460 AVGBrowserUpdate.exe 4164 AVGBrowserUpdate.exe 5852 AVGBrowserUpdate.exe 1788 AVGBrowserUpdateComRegisterShell64.exe 5852 AVGBrowserUpdate.exe 2496 AVGBrowserUpdateComRegisterShell64.exe 5852 AVGBrowserUpdate.exe 3400 AVGBrowserUpdateComRegisterShell64.exe 5852 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 5380 AVGBrowserUpdate.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 209.244.0.3 Destination IP 209.244.0.3 -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
BearShare.exerundll32.exerundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BearShare = "\"C:\\Program Files (x86)\\BearShare\\BearShare.exe\" /pause" BearShare.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks for any installed AV software in registry 1 TTPs 4 IoCs
Processes:
avg_secure_browser_setup.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast avg_secure_browser_setup.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\AVAST Software\Avast avg_secure_browser_setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast chrome.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\AVAST Software\Avast chrome.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
avg_secure_browser_setup.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exedescription ioc process File opened for modification \??\PhysicalDrive0 avg_secure_browser_setup.exe File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe -
Drops file in System32 directory 31 IoCs
Processes:
rsEngineSvc.exeGLBAB72.tmpdescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\439F613B3D55693954E1B080DE3085B4_C4927E03400A4F6EDB9D613E6354F864 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77003E887FC21E505B9E28CBA30E18ED_8ACE642DC0A43382FABA7AE806561A50 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_3628922DEBAD100477C4855B0A160F1C rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\439F613B3D55693954E1B080DE3085B4_C4927E03400A4F6EDB9D613E6354F864 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_32C5FE0A4543109B82E92C22E4CDDA65 rsEngineSvc.exe File created C:\Windows\SysWOW64\GLBSINST.%$D GLBAB72.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48B35517638A85CA46010B026C2B955A_5002FB34C1109443806FF4E1F2461E5E rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\86844F70250DD8EF225D6B4178798C21_2CDE88B3CC9A35A2EA16DC0201366139 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_32C5FE0A4543109B82E92C22E4CDDA65 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\86844F70250DD8EF225D6B4178798C21_2CDE88B3CC9A35A2EA16DC0201366139 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7850C7BAFAC9456B4B92328A61976502_CF3C9F2F77849F98D59EA5BE9C7AF324 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_3628922DEBAD100477C4855B0A160F1C rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\117308CCCD9C93758827D7CC85BB135E rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FA0E447C3E79584EC91182C66BBD2DB7 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77003E887FC21E505B9E28CBA30E18ED_8ACE642DC0A43382FABA7AE806561A50 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48B35517638A85CA46010B026C2B955A_5002FB34C1109443806FF4E1F2461E5E rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7850C7BAFAC9456B4B92328A61976502_CF3C9F2F77849F98D59EA5BE9C7AF324 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\117308CCCD9C93758827D7CC85BB135E rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FA0E447C3E79584EC91182C66BBD2DB7 rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB rsEngineSvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB rsEngineSvc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
AVGBrowserUpdateSetup.exeAVGBrowserUpdate.exeRAVAntivirus-installer.exeConhost.exefrostwire-6.9.10.windows.exesetup.exeGLBAB72.tmprsWSC.exersEngineSvc.exeHola-Setup-x64-1.203.908.exedescription ioc process File created C:\Program Files (x86)\GUMC615.tmp\goopdateres_no.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\goopdateres_fa.dll AVGBrowserUpdate.exe File created C:\Program Files\RAVAntivirus\ui\locales\en-US.pak RAVAntivirus-installer.exe File created C:\Program Files\RAVVPN\ui\locales\bn.pak Conhost.exe File created C:\Program Files\FrostWire 6\jre\legal\java.desktop\ASSEMBLY_EXCEPTION frostwire-6.9.10.windows.exe File created C:\Program Files\FrostWire 6\jre\legal\java.scripting\LICENSE frostwire-6.9.10.windows.exe File created C:\Program Files\FrostWire 6\jre\legal\jdk.crypto.ec\ADDITIONAL_LICENSE_INFO frostwire-6.9.10.windows.exe File created C:\Program Files\RAVAntivirus\ui\locales\ko.pak RAVAntivirus-installer.exe File created C:\Program Files\RAVAntivirus\ui\locales\mr.pak RAVAntivirus-installer.exe File created C:\Program Files\RAVAntivirus\System.ComponentModel.Primitives.dll RAVAntivirus-installer.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\107.0.19254.108\Locales\fa.pak setup.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\107.0.19254.108\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\BearShare\RunMSC.dll GLBAB72.tmp File created C:\Program Files (x86)\BearShare\~GLH0007.TMP GLBAB72.tmp File created C:\Program Files\FrostWire 6\jre\bin\syslookup.dll frostwire-6.9.10.windows.exe File created C:\Program Files\FrostWire 6\frostwire.bat frostwire-6.9.10.windows.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\AVGBrowserQHelper.exe setup.exe File created C:\Program Files\RAVVPN\ui\locales\vi.pak Conhost.exe File created C:\Program Files\RAVVPN\ui\libGLESv2.dll Conhost.exe File created C:\Program Files\FrostWire 6\jre\bin\api-ms-win-crt-conio-l1-1-0.dll frostwire-6.9.10.windows.exe File created C:\Program Files\FrostWire 6\frostwire.jar frostwire-6.9.10.windows.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\AVGBrowser.exe setup.exe File created C:\Program Files (x86)\GUMC615.tmp\goopdateres_zh-CN.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\RAVVPN\rsVPNSvc.Proxy.dll.config Conhost.exe File created C:\Program Files\RAVVPN\ui\locales\ja.pak Conhost.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\107.0.19254.108\Locales\am.pak setup.exe File opened for modification C:\Program Files\RAVAntivirus\InstallUtil.InstallLog rsWSC.exe File created C:\Program Files (x86)\BearShare\~GLH000e.TMP GLBAB72.tmp File created C:\Program Files (x86)\GUMC615.tmp\goopdateres_kn.dll AVGBrowserUpdateSetup.exe File opened for modification C:\Program Files\RAVAntivirus\InstallUtil.InstallLog rsEngineSvc.exe File created C:\Program Files\RAVVPN\System.Data.SQLite.dll Conhost.exe File created C:\Program Files\FrostWire 6\jre\bin\java.dll frostwire-6.9.10.windows.exe File created C:\Program Files\RAVAntivirus\ui\locales\es-419.pak RAVAntivirus-installer.exe File created C:\Program Files\RAVAntivirus\rsEngine.Utilities.dll RAVAntivirus-installer.exe File created C:\Program Files\RAVVPN\OpenVPN\legacy\i386\OemVista.inf Conhost.exe File created C:\Program Files\Hola\log\ui.log Hola-Setup-x64-1.203.908.exe File created C:\Program Files\FrostWire 6\jre\legal\java.transaction.xa\ADDITIONAL_LICENSE_INFO frostwire-6.9.10.windows.exe File created C:\Program Files\FrostWire 6\jre\legal\jdk.net\ASSEMBLY_EXCEPTION frostwire-6.9.10.windows.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\goopdateres_sr.dll AVGBrowserUpdate.exe File created C:\Program Files\RAVAntivirus\ui\locales\ml.pak RAVAntivirus-installer.exe File created C:\Program Files\RAVAntivirus\System.ComponentModel.EventBasedAsync.dll RAVAntivirus-installer.exe File created C:\Program Files\RAVVPN\ui\locales\hr.pak Conhost.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\AVGBrowser.VisualElementsManifest.xml setup.exe File opened for modification C:\Program Files (x86)\AVG\Browser\Application\master_preferences setup.exe File created C:\Program Files\RAVVPN\ui\locales\hi.pak Conhost.exe File created C:\Program Files\RAVVPN\ui\locales\zh-CN.pak Conhost.exe File opened for modification C:\Program Files (x86)\BearShare\Webstats.ini GLBAB72.tmp File created C:\Program Files (x86)\GUMC615.tmp\goopdateres_fa.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\RAVAntivirus\System.ValueTuple.dll RAVAntivirus-installer.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\107.0.19254.108\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files\RAVVPN\ui\locales\ar.pak Conhost.exe File created C:\Program Files\RAVVPN\ui\locales\cs.pak Conhost.exe File created C:\Program Files\RAVVPN\ui\locales\fi.pak Conhost.exe File created C:\Program Files\RAVVPN\OpenVPN\new\i386\tap0901.sys Conhost.exe File created C:\Program Files\FrostWire 6\jre\legal\java.prefs\LICENSE frostwire-6.9.10.windows.exe File created C:\Program Files\RAVAntivirus\System.Diagnostics.Contracts.dll RAVAntivirus-installer.exe File created C:\Program Files\RAVVPN\VpnSDK.Private.WFP.dll Conhost.exe File created C:\Program Files\FrostWire 6\jre\conf\security\java.security frostwire-6.9.10.windows.exe File created C:\Program Files\FrostWire 6\jre\legal\jdk.crypto.cryptoki\ASSEMBLY_EXCEPTION frostwire-6.9.10.windows.exe File created C:\Program Files\RAVAntivirus\ui\locales\lv.pak RAVAntivirus-installer.exe File created C:\Program Files\RAVAntivirus\amd64\vcruntime140.dll RAVAntivirus-installer.exe File created C:\Program Files\RAVAntivirus\System.IO.Pipes.dll RAVAntivirus-installer.exe File created C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\107.0.19254.108\Locales\pl.pak setup.exe File created C:\Program Files\Hola\app\hola.exe Hola-Setup-x64-1.203.908.exe -
Launches sc.exe 63 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 8680 sc.exe 8940 sc.exe 8932 sc.exe 8720 sc.exe 9108 sc.exe 8948 sc.exe 8908 sc.exe 8964 sc.exe 8892 sc.exe 8868 sc.exe 8768 sc.exe 8696 sc.exe 8784 sc.exe 9116 sc.exe 9100 sc.exe 9140 sc.exe 8752 sc.exe 8672 sc.exe 8712 sc.exe 8640 sc.exe 9060 sc.exe 8852 sc.exe 9044 sc.exe 8916 sc.exe 8728 sc.exe 9084 sc.exe 9068 sc.exe 8996 sc.exe 8972 sc.exe 8760 sc.exe 9052 sc.exe 9020 sc.exe 8900 sc.exe 8884 sc.exe 8688 sc.exe 8656 sc.exe 8648 sc.exe 9148 sc.exe 8776 sc.exe 8744 sc.exe 9092 sc.exe 9012 sc.exe 8956 sc.exe 9124 sc.exe 8804 sc.exe 8796 sc.exe 8844 sc.exe 8836 sc.exe 9036 sc.exe 9028 sc.exe 9004 sc.exe 8860 sc.exe 8704 sc.exe 8812 sc.exe 8736 sc.exe 8980 sc.exe 8876 sc.exe 8828 sc.exe 8924 sc.exe 8820 sc.exe 9132 sc.exe 9076 sc.exe 8988 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 9416 752 WerFault.exe Hola-Browser-Agreed-Inst-C-Amb3.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
avg_secure_browser_setup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI avg_secure_browser_setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI avg_secure_browser_setup.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
frostwire-6.9.10.windows.tmprunonce.exerunonce.exeBearShare.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 frostwire-6.9.10.windows.tmp Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BearShare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz BearShare.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier BearShare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ frostwire-6.9.10.windows.tmp -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4260 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Processes:
GLBAB72.tmpAVGBrowserUpdate.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main GLBAB72.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppName = "AVGBrowserUpdateBroker.exe" AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\Policy = "3" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppName = "AVGBrowserUpdateWebPlugin.exe" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2" AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\Policy = "3" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2" AVGBrowserUpdate.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
GLBAB72.tmpdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://google.bearshare.com/" GLBAB72.tmp -
Modifies data under HKEY_USERS 64 IoCs
Processes:
rsEngineSvc.exersWSC.exeAVGBrowserUpdate.exeGLBAB72.tmpdescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs rsEngineSvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\MachineId = "000058d4b27a012b9e3e4541471e6c69" AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes GLBAB72.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\endpoint = "update.avgbrowser.com" AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps\BearShare GLBAB72.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps GLBAB72.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs rsEngineSvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps\BearShare\BearShareChatNotifyMsg\ GLBAB72.tmp Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\EventLabels\BearShareChatNotifyMsg GLBAB72.tmp Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\ AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser AVGBrowserUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\hostprefix AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT GLBAB72.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps\BearShare\BearShareChatNotifyMsg\.Current GLBAB72.tmp Set value (str) \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps\BearShare\BearShareChatNotifyMsg\.Current\ = "C:\\Program Files (x86)\\BearShare\\sounds\\notify.wav" GLBAB72.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs rsWSC.exe -
Modifies registry class 64 IoCs
Processes:
AVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exefrostwire-6.9.10.windows.exeAVGBrowserUpdateComRegisterShell64.exesetup.exeregsvr32.exeAVGBrowserUpdate.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\InProcServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\psmachine_64.dll" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879}\NumMethods AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\InprocServer32\ = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\npAvgBrowserUpdate3.dll" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\edit\command frostwire-6.9.10.windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2DAE1732-F855-42A3-9D28-B7F6E291ECCD}\ProxyStubClsid32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A708F91-06A3-409E-83BC-4A5CF10C8025}\ProxyStubClsid32\ = "{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E3700FAF-2DC2-4322-99B1-D6A51203AF77}\ = "IMiscUtils" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\NumMethods\ = "41" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0C0BAA6C-52FD-4A3F-8731-F588C5E8F191}\NumMethods\ = "8" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{804EC8ED-BF49-41ED-BCD0-CA1D716D3E98}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45F7CBA5-258D-4852-AD0A-B18F3FB214F4} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2DAE1732-F855-42A3-9D28-B7F6E291ECCD} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BAAD654E-4B50-4C9F-A261-CF29CF884478}\LocalizedString = "@C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1207.2\\goopdate.dll,-3000" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A025DF-6171-460F-B9A1-29ECE33E754E}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BE1521-7935-42E6-B606-058A559910BA}\NumMethods\ = "11" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BE1521-7935-42E6-B606-058A559910BA}\ProxyStubClsid32\ = "{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C8159E37-5EDF-4E6D-8E6D-E558E8DDC2A0} AVGBrowserUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AAF0186F-DA10-4E75-88D7-6BD34F515838}\InprocHandler32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BE1521-7935-42E6-B606-058A559910BA}\ = "IAppCommandWeb" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C7B73E65-20BA-407F-8A89-DF649EF82559} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CCD3788-C8CC-4EE9-8DF7-944B7D9674F2}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.ProcessLauncher\ = "Google Update Process Launcher Class" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassMachineFallback.1.0\ = "Google Update Legacy On Demand" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\OpenWithProgIds\AvgHTML setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\NumMethods\ = "41" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\ProxyStubClsid32\ = "{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C7E81D6-0463-485E-8DF5-2ADAD81FAF40}\NumMethods\ = "8" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{804EC8ED-BF49-41ED-BCD0-CA1D716D3E98}\NumMethods\ = "10" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C285D18D-43A2-4AEF-83FB-BF280E660A97}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2DAE1732-F855-42A3-9D28-B7F6E291ECCD} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DD8E03F-6BE1-41E2-B931-A37C7D1C0317}\NumMethods\ = "4" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45F7CBA5-258D-4852-AD0A-B18F3FB214F4}\ProxyStubClsid32\ = "{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}\ = "PSFactoryBuffer" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45F7CBA5-258D-4852-AD0A-B18F3FB214F4}\NumMethods\ = "4" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B02B2F29-8637-4B78-892A-CFD7CCE793EC} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A025DF-6171-460F-B9A1-29ECE33E754E}\ProxyStubClsid32\ = "{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D37D106C-CDD2-4821-BC7A-F08990DDCA74}\ = "IGoogleUpdateCore" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{804EC8ED-BF49-41ED-BCD0-CA1D716D3E98}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3WebMachine\CLSID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CoCreateAsync\CurVer AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D37D106C-CDD2-4821-BC7A-F08990DDCA74} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7E22D0ED-B403-44D2-BABF-4DDD0DFCA692}\LocalServer32 AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{40C1C1D3-AAEA-46EE-AA2B-79A2CC62F257} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3COMClassService\CurVer\ = "AVGUpdate.Update3COMClassService.1.0" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\ProxyStubClsid32\ = "{1018A8C2-3B2E-405E-BC0F-06AECA5BF715}" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B80EC6B9-55FF-4E4F-B4E8-9BD098DBBAA5}\VersionIndependentProgID\ = "AVGUpdate.CoCreateAsync" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{28E08968-59C8-4A77-BEBA-12C9394AE077}\InprocServer32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A725D612-7D72-48B8-857A-4777781F415C}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\AVG\\Browser\\Application\\107.0.19254.108\\notification_helper.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{59577BB5-F97B-4880-B785-510238C5C5CE} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C7B73E65-20BA-407F-8A89-DF649EF82559}\ = "ICurrentState" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C7E81D6-0463-485E-8DF5-2ADAD81FAF40}\NumMethods\ = "8" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CredentialDialogMachine.1.0\ = "goopdate CredentialDialog" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C7B73E65-20BA-407F-8A89-DF649EF82559}\NumMethods\ = "24" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C8159E37-5EDF-4E6D-8E6D-E558E8DDC2A0}\NumMethods\ = "5" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassMachine.1.0 AVGBrowserUpdate.exe -
Modifies registry key 1 TTPs 13 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 6764 reg.exe 6816 reg.exe 6984 reg.exe 9632 reg.exe 4540 reg.exe 6652 reg.exe 6524 reg.exe 6600 reg.exe 6708 reg.exe 6860 reg.exe 6904 reg.exe 6224 reg.exe 6308 reg.exe -
Processes:
avg_secure_browser_setup.exersWSC.exersEngineSvc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 avg_secure_browser_setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 avg_secure_browser_setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 avg_secure_browser_setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 rsWSC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 rsWSC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 rsWSC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 rsWSC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 5c0000000100000004000000001000001900000001000000100000009f687581f7ef744ecfc12b9cee6238f1030000000100000014000000f40042e2e5f7e8ef8189fed15519aece42c3bfa21d0000000100000010000000e78921f81cea4d4105d2b5f4afae0c78140000000100000014000000c87ed26a852a1bca1998040727cf50104f68a8a2090000000100000016000000301406082b0601050507030306082b060105050703086200000001000000200000005367f20c7ade0e2bca790915056d086b720c33c1fa2a2661acf787e3292e12700b00000001000000800000004d006900630072006f0073006f006600740020004900640065006e007400690074007900200056006500720069006600690063006100740069006f006e00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079002000320030003200300000000f000000010000003000000041ce925678dfe0ccaa8089263c242b897ca582089d14e5eb685fca967f36dbd334e97e81fd0e64815f851f914ade1a1e040000000100000010000000be954f16012122448ca8bc279602acf52000000001000000d0050000308205cc308203b4a00302010202105498d2d1d45b1995481379c811c08799300d06092a864886f70d01010c05003077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f726974792032303230301e170d3230303431363138333631365a170d3435303431363138343434305a3077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f72697479203230323030820222300d06092a864886f70d01010105000382020f003082020a0282020100b3912a07830667fd9e9de0c7c0b7a4e642047f0fa6db5ffbd55ad745a0fb770bf080f3a66d5a4d7953d8a08684574520c7a254fbc7a2bf8ac76e35f3a215c42f4ee34a8596490dffbe99d814f6bc2707ee429b2bf50b9206e4fd691365a89172f29884eb833d0ee4d771124821cb0dedf64749b79bf9c9c717b6844fffb8ac9ad773674985e386bd3740d02586d4deb5c26d626ad5a978bc2d6f49f9e56c1414fd14c7d3651637decb6ebc5e298dfd629b152cd605e6b9893233a362c7d7d6526708c42ef4562b9e0b87cceca7b4a6aaeb05cd1957a53a0b04271c91679e2d622d2f1ebedac020cb0419ca33fb89be98e272a07235be79e19c836fe46d176f90f33d008675388ed0e0499abbdbd3f830cad55788684d72d3bf6d7f71d8fdbd0dae926448b75b6f7926b5cd9b952184d1ef0f323d7b578cf345074c7ce05e180e35768b6d9ecb3674ab05f8e0735d3256946797250ac6353d9497e7c1448b80fdc1f8f47419e530f606fb21573e061c8b6b158627497b8293ca59e87547e83f38f4c75379a0b6b4e25c51efbd5f38c113e6780c955a2ec5405928cc0f24c0ecba0977239938a6b61cdac7ba20b6d737d87f37af08e33b71db6e731b7d9972b0e486335974b516007b506dc68613dafdc439823d24009a60daba94c005512c34ac50991387bbb30580b24d30025cb826835db46373efae23954f6028be37d55ba50203010001a3543052300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414c87ed26a852a1bca1998040727cf50104f68a8a2301006092b06010401823715010403020100300d06092a864886f70d01010c05000382020100af6adde619e72d9443194ecbe9509564a50391028be236803b15a252c21619b66a5a5d744330f49bff607409b1211e90166dc5248f5c668863f44fcc7df2124c40108b019fdaa9c8aef2951bcf9d05eb493e74a0685be5562c651c827e53da56d94617799245c4103608522917cb2fa6f27ed469248a1e8fb0730dcc1c4aabb2aaeda79163016422a832b87e3228b367732d91b4dc31010bf7470aa6f1d74aed5660c42c08a37b40b0bc74275287d6be88dd378a896e67881df5c95da0feb6ab3a80d71a973c173622411eac4dd583e63c38bd4f30e954a9d3b604c3327661bbb018c52b18b3c080d5b795b05e514d22fcec58aae8d894b4a52eed92dee7187c2157dd5563f7bf6dcd1fd2a6772870c7e25b3a5b08d25b4ec80096b3e18336af860a655c74f6eaec7a6a74a0f04beeef94a3ac50f287edd73a3083c9fb7d57bee5e3f841cae564aeb3a3ec58ec859accefb9eaf35618b95c739aafc577178359db371a187254a541d2b62375a3439ae5777c9679b7418dbfecdc80a09fd17775585f3513e0251a670b7dce25fa070ae46121d8d41ce507c63699f496d0c615fe4ecdd7ae8b9ddb16fd04c692bdd488e6a9a3aabbf764383b5fcc0cd035be741903a6c5aa4ca26136823e1df32bbc975ddb4b783b2df53bef6023e8f5ec0b233695af9866bf53d37bb8694a2a966669c494c6f45f6eac98788880065ca2b2eda2 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 avg_secure_browser_setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 avg_secure_browser_setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 0f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e42000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e rsWSC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 040000000100000010000000be954f16012122448ca8bc279602acf50f000000010000003000000041ce925678dfe0ccaa8089263c242b897ca582089d14e5eb685fca967f36dbd334e97e81fd0e64815f851f914ade1a1e0b00000001000000800000004d006900630072006f0073006f006600740020004900640065006e007400690074007900200056006500720069006600690063006100740069006f006e00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079002000320030003200300000006200000001000000200000005367f20c7ade0e2bca790915056d086b720c33c1fa2a2661acf787e3292e1270090000000100000016000000301406082b0601050507030306082b06010505070308140000000100000014000000c87ed26a852a1bca1998040727cf50104f68a8a21d0000000100000010000000e78921f81cea4d4105d2b5f4afae0c78030000000100000014000000f40042e2e5f7e8ef8189fed15519aece42c3bfa21900000001000000100000009f687581f7ef744ecfc12b9cee6238f12000000001000000d0050000308205cc308203b4a00302010202105498d2d1d45b1995481379c811c08799300d06092a864886f70d01010c05003077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f726974792032303230301e170d3230303431363138333631365a170d3435303431363138343434305a3077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f72697479203230323030820222300d06092a864886f70d01010105000382020f003082020a0282020100b3912a07830667fd9e9de0c7c0b7a4e642047f0fa6db5ffbd55ad745a0fb770bf080f3a66d5a4d7953d8a08684574520c7a254fbc7a2bf8ac76e35f3a215c42f4ee34a8596490dffbe99d814f6bc2707ee429b2bf50b9206e4fd691365a89172f29884eb833d0ee4d771124821cb0dedf64749b79bf9c9c717b6844fffb8ac9ad773674985e386bd3740d02586d4deb5c26d626ad5a978bc2d6f49f9e56c1414fd14c7d3651637decb6ebc5e298dfd629b152cd605e6b9893233a362c7d7d6526708c42ef4562b9e0b87cceca7b4a6aaeb05cd1957a53a0b04271c91679e2d622d2f1ebedac020cb0419ca33fb89be98e272a07235be79e19c836fe46d176f90f33d008675388ed0e0499abbdbd3f830cad55788684d72d3bf6d7f71d8fdbd0dae926448b75b6f7926b5cd9b952184d1ef0f323d7b578cf345074c7ce05e180e35768b6d9ecb3674ab05f8e0735d3256946797250ac6353d9497e7c1448b80fdc1f8f47419e530f606fb21573e061c8b6b158627497b8293ca59e87547e83f38f4c75379a0b6b4e25c51efbd5f38c113e6780c955a2ec5405928cc0f24c0ecba0977239938a6b61cdac7ba20b6d737d87f37af08e33b71db6e731b7d9972b0e486335974b516007b506dc68613dafdc439823d24009a60daba94c005512c34ac50991387bbb30580b24d30025cb826835db46373efae23954f6028be37d55ba50203010001a3543052300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414c87ed26a852a1bca1998040727cf50104f68a8a2301006092b06010401823715010403020100300d06092a864886f70d01010c05000382020100af6adde619e72d9443194ecbe9509564a50391028be236803b15a252c21619b66a5a5d744330f49bff607409b1211e90166dc5248f5c668863f44fcc7df2124c40108b019fdaa9c8aef2951bcf9d05eb493e74a0685be5562c651c827e53da56d94617799245c4103608522917cb2fa6f27ed469248a1e8fb0730dcc1c4aabb2aaeda79163016422a832b87e3228b367732d91b4dc31010bf7470aa6f1d74aed5660c42c08a37b40b0bc74275287d6be88dd378a896e67881df5c95da0feb6ab3a80d71a973c173622411eac4dd583e63c38bd4f30e954a9d3b604c3327661bbb018c52b18b3c080d5b795b05e514d22fcec58aae8d894b4a52eed92dee7187c2157dd5563f7bf6dcd1fd2a6772870c7e25b3a5b08d25b4ec80096b3e18336af860a655c74f6eaec7a6a74a0f04beeef94a3ac50f287edd73a3083c9fb7d57bee5e3f841cae564aeb3a3ec58ec859accefb9eaf35618b95c739aafc577178359db371a187254a541d2b62375a3439ae5777c9679b7418dbfecdc80a09fd17775585f3513e0251a670b7dce25fa070ae46121d8d41ce507c63699f496d0c615fe4ecdd7ae8b9ddb16fd04c692bdd488e6a9a3aabbf764383b5fcc0cd035be741903a6c5aa4ca26136823e1df32bbc975ddb4b783b2df53bef6023e8f5ec0b233695af9866bf53d37bb8694a2a966669c494c6f45f6eac98788880065ca2b2eda2 rsEngineSvc.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 552 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exeavg_secure_browser_setup.exeAVGBrowserUpdate.exeAVGBrowser.exeAVGBrowser.exersClientSvc.exechrome.exechrome.exeConhost.exersEngineSvc.exepid process 1072 chrome.exe 1072 chrome.exe 4996 chrome.exe 4996 chrome.exe 4644 chrome.exe 4644 chrome.exe 3544 chrome.exe 3544 chrome.exe 5948 chrome.exe 5948 chrome.exe 5428 chrome.exe 5428 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 4564 chrome.exe 4564 chrome.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 1708 avg_secure_browser_setup.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 3448 AVGBrowser.exe 3448 AVGBrowser.exe 5344 AVGBrowser.exe 5344 AVGBrowser.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 4460 AVGBrowserUpdate.exe 1420 rsClientSvc.exe 1420 rsClientSvc.exe 4492 chrome.exe 4492 chrome.exe 556 chrome.exe 556 chrome.exe 3468 Conhost.exe 3468 Conhost.exe 4024 rsEngineSvc.exe 4024 rsEngineSvc.exe 4024 rsEngineSvc.exe 4024 rsEngineSvc.exe -
Suspicious behavior: LoadsDriver 4 IoCs
Processes:
fltmc.exefltmc.exepid process 2760 fltmc.exe 2732 fltmc.exe 672 672 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
Processes:
chrome.exepid process 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
BearShare.exeAUDIODG.EXEwmic.exewmic.exedescription pid process Token: 33 6032 BearShare.exe Token: SeIncBasePriorityPrivilege 6032 BearShare.exe Token: 33 5436 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5436 AUDIODG.EXE Token: SeIncreaseQuotaPrivilege 6064 wmic.exe Token: SeSecurityPrivilege 6064 wmic.exe Token: SeTakeOwnershipPrivilege 6064 wmic.exe Token: SeLoadDriverPrivilege 6064 wmic.exe Token: SeSystemProfilePrivilege 6064 wmic.exe Token: SeSystemtimePrivilege 6064 wmic.exe Token: SeProfSingleProcessPrivilege 6064 wmic.exe Token: SeIncBasePriorityPrivilege 6064 wmic.exe Token: SeCreatePagefilePrivilege 6064 wmic.exe Token: SeBackupPrivilege 6064 wmic.exe Token: SeRestorePrivilege 6064 wmic.exe Token: SeShutdownPrivilege 6064 wmic.exe Token: SeDebugPrivilege 6064 wmic.exe Token: SeSystemEnvironmentPrivilege 6064 wmic.exe Token: SeRemoteShutdownPrivilege 6064 wmic.exe Token: SeUndockPrivilege 6064 wmic.exe Token: SeManageVolumePrivilege 6064 wmic.exe Token: 33 6064 wmic.exe Token: 34 6064 wmic.exe Token: 35 6064 wmic.exe Token: 36 6064 wmic.exe Token: SeIncreaseQuotaPrivilege 6064 wmic.exe Token: SeSecurityPrivilege 6064 wmic.exe Token: SeTakeOwnershipPrivilege 6064 wmic.exe Token: SeLoadDriverPrivilege 6064 wmic.exe Token: SeSystemProfilePrivilege 6064 wmic.exe Token: SeSystemtimePrivilege 6064 wmic.exe Token: SeProfSingleProcessPrivilege 6064 wmic.exe Token: SeIncBasePriorityPrivilege 6064 wmic.exe Token: SeCreatePagefilePrivilege 6064 wmic.exe Token: SeBackupPrivilege 6064 wmic.exe Token: SeRestorePrivilege 6064 wmic.exe Token: SeShutdownPrivilege 6064 wmic.exe Token: SeDebugPrivilege 6064 wmic.exe Token: SeSystemEnvironmentPrivilege 6064 wmic.exe Token: SeRemoteShutdownPrivilege 6064 wmic.exe Token: SeUndockPrivilege 6064 wmic.exe Token: SeManageVolumePrivilege 6064 wmic.exe Token: 33 6064 wmic.exe Token: 34 6064 wmic.exe Token: 35 6064 wmic.exe Token: 36 6064 wmic.exe Token: SeIncreaseQuotaPrivilege 2588 wmic.exe Token: SeSecurityPrivilege 2588 wmic.exe Token: SeTakeOwnershipPrivilege 2588 wmic.exe Token: SeLoadDriverPrivilege 2588 wmic.exe Token: SeSystemProfilePrivilege 2588 wmic.exe Token: SeSystemtimePrivilege 2588 wmic.exe Token: SeProfSingleProcessPrivilege 2588 wmic.exe Token: SeIncBasePriorityPrivilege 2588 wmic.exe Token: SeCreatePagefilePrivilege 2588 wmic.exe Token: SeBackupPrivilege 2588 wmic.exe Token: SeRestorePrivilege 2588 wmic.exe Token: SeShutdownPrivilege 2588 wmic.exe Token: SeDebugPrivilege 2588 wmic.exe Token: SeSystemEnvironmentPrivilege 2588 wmic.exe Token: SeRemoteShutdownPrivilege 2588 wmic.exe Token: SeUndockPrivilege 2588 wmic.exe Token: SeManageVolumePrivilege 2588 wmic.exe Token: 33 2588 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exefrostwire-6.9.10.windows.tmpfrostwire-6.9.10.windows.exeAVGBrowser.exepid process 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 5808 frostwire-6.9.10.windows.tmp 6020 frostwire-6.9.10.windows.exe 3448 AVGBrowser.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
BearShare.exefrostwire-6.9.10.windows.tmppid process 6032 BearShare.exe 6032 BearShare.exe 6032 BearShare.exe 6032 BearShare.exe 6032 BearShare.exe 5808 frostwire-6.9.10.windows.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4996 wrote to memory of 4000 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 4000 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 312 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 1072 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 1072 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe PID 4996 wrote to memory of 5096 4996 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\scammer.png1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xac,0x108,0x7ffa81254f50,0x7ffa81254f60,0x7ffa81254f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1612 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2368 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2880 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2904 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4408 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4528 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4544 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5216 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5228 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5252 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5740 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5620 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6080 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6068 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6044 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6032 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6012 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5212 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6432 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6516 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6428 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6712 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6708 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6024 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6952 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7200 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7176 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7684 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8204 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8404 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8080 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7836 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7196 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7508 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8496 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2308 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8500 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8152 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5704 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7536 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8168 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7928 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8360 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8836 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8724 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=70 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7264 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8348 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7496 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8960 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8948 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8792 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\bearshare525.exe"C:\Users\Admin\Downloads\bearshare525.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\GLBAB72.tmpC:\Users\Admin\AppData\Local\Temp\GLBAB72.tmp 4736 C:\Users\Admin\DOWNLO~1\BEARSH~1.EXE3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\BearShare\RunMSC.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\BearShare\BearShare.exe"C:\Program Files (x86)\BearShare\BearShare.exe" -firstlaunch4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8588 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7940 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=81 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9736 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=82 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1084 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=84 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9456 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=86 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9704 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=85 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9708 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9304 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=89 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7580 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9912 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=93 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=94 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7860 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=95 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9716 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=98 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=97 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9632 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9768 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=99 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9016 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=100 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1472 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=101 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8376 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=102 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=103 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=104 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8476 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=105 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7840 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=107 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9220 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=106 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=110 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8384 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=109 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=112 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10112 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=111 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10000 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=108 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=114 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9760 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=113 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7044 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=115 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10208 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=116 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7004 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=117 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9000 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=118 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=120 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=119 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=121 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=122 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9284 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=123 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=124 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9424 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=125 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9580 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=126 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8456 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=128 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=129 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7404 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=130 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9284 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=131 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7404 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=132 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9772 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=133 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=134 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3128 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4828 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8648 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9472 /prefetch:82⤵
-
C:\Users\Admin\Downloads\frostwire-6.9.10.windows.exe"C:\Users\Admin\Downloads\frostwire-6.9.10.windows.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-JU9OR.tmp\frostwire-6.9.10.windows.tmp"C:\Users\Admin\AppData\Local\Temp\is-JU9OR.tmp\frostwire-6.9.10.windows.tmp" /SL5="$50236,1716697,917504,C:\Users\Admin\Downloads\frostwire-6.9.10.windows.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\frostwire-6.9.10.windows.exe"C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\frostwire-6.9.10.windows.exe" /S4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic process where name='fwplayer.exe' delete5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic process where name='telluride.exe' delete5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic process where name='FrostWire.exe' delete5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\prod0.exe"C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\prod0.exe" -ip:"dui=9be0bf4d-f8db-4af4-be85-dc38433c9501&dit=20221127171648&is_silent=true&oc=ZB_RAV_Cross_Tri_NCB&p=89fe&a=100&b=&se=true" -vp:"dui=9be0bf4d-f8db-4af4-be85-dc38433c9501&dit=20221127171648&oc=ZB_RAV_Cross_Tri_NCB&p=89fe&oip=26&ptl=7&dta=true&a=100" -dp:"dui=9be0bf4d-f8db-4af4-be85-dc38433c9501&dit=20221127171648&oc=ZB_RAV_Cross_Tri_NCB&p=89fe&a=100" -i -v -d -se=true4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\0k4l2t5t.exe"C:\Users\Admin\AppData\Local\Temp\0k4l2t5t.exe" /silent5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\nsnAF52.tmp\RAVAntivirus-installer.exe"C:\Users\Admin\AppData\Local\Temp\nsnAF52.tmp\RAVAntivirus-installer.exe" "C:\Users\Admin\AppData\Local\Temp\0k4l2t5t.exe" /silent6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files\RAVAntivirus\x64\rsSyncSvc.exe"C:\Program Files\RAVAntivirus\x64\rsSyncSvc.exe" -i -rpn:RAVAntivirus -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v1/live -dt:107⤵
- Executes dropped EXE
-
\??\c:\windows\system32\rundll32.exe"c:\windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\RAVAntivirus\x64\ReasonCamFilter.inf7⤵
- Adds Run key to start application
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r8⤵
- Checks processor information in registry
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o9⤵
-
C:\Windows\SYSTEM32\fltmc.exe"fltmc.exe" load ReasonCamFilter7⤵
- Suspicious behavior: LoadsDriver
-
\??\c:\windows\system32\rundll32.exe"c:\windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\RAVAntivirus\x64\rsKernelEngine.inf7⤵
- Adds Run key to start application
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r8⤵
- Checks processor information in registry
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o9⤵
-
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\RAVAntivirus\x64\rsKernelEngineEvents.xml7⤵
-
C:\Windows\SYSTEM32\fltmc.exe"fltmc.exe" load rsKernelEngine7⤵
- Suspicious behavior: LoadsDriver
-
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\RAVAntivirus\elam\evntdrv.xml7⤵
-
C:\Program Files\RAVAntivirus\rsWSC.exe"C:\Program Files\RAVAntivirus\rsWSC.exe" -i7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies system certificate store
-
C:\Program Files\RAVAntivirus\rsClientSvc.exe"C:\Program Files\RAVAntivirus\rsClientSvc.exe" -i7⤵
- Executes dropped EXE
-
C:\Program Files\RAVAntivirus\rsEngineSvc.exe"C:\Program Files\RAVAntivirus\rsEngineSvc.exe" -i7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\4hbba5ae.exe"C:\Users\Admin\AppData\Local\Temp\4hbba5ae.exe" /silent5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RAVVPN\RAVVPN-installer.exe"C:\Users\Admin\AppData\Local\Temp\RAVVPN\RAVVPN-installer.exe" "C:\Users\Admin\AppData\Local\Temp\4hbba5ae.exe" /silent6⤵
-
C:\Program Files\RAVVPN\ReasonVPNInstaller.exe"C:\Program Files\RAVVPN\ReasonVPNInstaller.exe" /install7⤵
-
C:\Program Files\RAVVPN\rsVPNSvc.exe"C:\Program Files\RAVVPN\rsVPNSvc.exe" -i8⤵
-
C:\Program Files\RAVVPN\rsVPNClientSvc.exe"C:\Program Files\RAVVPN\rsVPNClientSvc.exe" -i8⤵
-
C:\Users\Admin\AppData\Local\Temp\gshkewgg.exe"C:\Users\Admin\AppData\Local\Temp\gshkewgg.exe" /silent5⤵
-
C:\Users\Admin\AppData\Local\Temp\SaferWeb\SaferWeb-installer.exe"C:\Users\Admin\AppData\Local\Temp\SaferWeb\SaferWeb-installer.exe" "C:\Users\Admin\AppData\Local\Temp\gshkewgg.exe" /silent6⤵
-
C:\Program Files\SaferWeb\ReasonDNSInstaller.exe"C:\Program Files\SaferWeb\ReasonDNSInstaller.exe" /install7⤵
-
C:\Program Files\SaferWeb\rsDNSResolver.exe"C:\Program Files\SaferWeb\rsDNSResolver.exe" -service install8⤵
-
C:\Program Files\SaferWeb\rsDNSResolver.exe"C:\Program Files\SaferWeb\rsDNSResolver.exe" -service start8⤵
-
\??\c:\windows\system32\rundll32.exe"c:\windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\SaferWeb\rsDwf.inf8⤵
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r9⤵
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o10⤵
-
C:\Program Files\SaferWeb\rsDNSSvc.exe"C:\Program Files\SaferWeb\rsDNSSvc.exe" -i8⤵
-
C:\Program Files\SaferWeb\rsDNSClientSvc.exe"C:\Program Files\SaferWeb\rsDNSClientSvc.exe" -i8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\prod1_extract\avg_secure_browser_setup.exe"C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\prod1_extract\avg_secure_browser_setup.exe" /s /run_source=avg_ads_is_control /is_pixel_psh=BjYV4UB0PXW0kmwpUtQF4WYLHB8BmvT9GquMrf7aEtE97j9GkMh3DKbIUyxCxroLIAxGRBxeDS2tiQp /make-default4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\nsjA5DD.tmp\AVGBrowserUpdateSetup.exeAVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=es-ES&brand=9145&installargs=--make-chrome-default --force-default-win10 --reset-default-win10 --auto-import-data%3Dchrome --import-cookies --auto-launch-chrome --private-browsing"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\GUMC615.tmp\AVGBrowserUpdate.exe"C:\Program Files (x86)\GUMC615.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=es-ES&brand=9145&installargs=--make-chrome-default --force-default-win10 --reset-default-win10 --auto-import-data%3Dchrome --import-cookies --auto-launch-chrome --private-browsing"6⤵
- Executes dropped EXE
- Sets file execution options in registry
- Checks computer location settings
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping 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-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuOC4xMjA3LjIiIGxhbmc9ImVzLUVTIiBicmFuZD0iOTE0NSIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNTY4MSIvPjwvYXBwPjwvcmVxdWVzdD47⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=es-ES&brand=9145&installargs=--make-chrome-default --force-default-win10 --reset-default-win10 --auto-import-data%3Dchrome --import-cookies --auto-launch-chrome --private-browsing" /installsource otherinstallcmd /sessionid "{FC900A19-1ADE-4F7C-B807-A0F27DEF317D}" /silent7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /nobreak /t 10 && del /F /Q C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\prod1_extract\avg_secure_browser_setup.exe && rmdir /Q C:\Users\Admin\AppData\Local\Temp\is-ENJKD.tmp\prod1_extract5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 106⤵
- Delays execution with timeout.exe
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=141 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4332 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=142 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9508 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9532 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6836 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9040 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=10224 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2324 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7324 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6376 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7492 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9620 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=152 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9172 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=153 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=154 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8708 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=155 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9904 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=156 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=158 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8608 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=159 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7084 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=160 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8136 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=161 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9904 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=162 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3760 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5292 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4688 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6904 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6092 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8144 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=171 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9472 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=172 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=173 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8728 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6752 /prefetch:82⤵
- Checks for any installed AV software in registry
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3740 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9816 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7592 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7228 /prefetch:82⤵
-
C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe" --monitor 19163⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 17164⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe"C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe" --silent --agree --app browser --campaign amb3 --no-run-uis --no-rmt-conf --no-updater --no-hola-cr --track-download 63838dff7ef198598731032f --hola-domain holavpninstaller.com3⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files\Hola\app\net_updater64.exe"C:\Program Files\Hola\app\net_updater64.exe" --install win_hola.browser.hola.org4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe"C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe" --silent --agree --app browser --campaign amb3 --no-run-uis --no-rmt-conf --no-updater --no-svc --hola-cr-path "C:\\Users\\Admin\\AppData\\Local\\Temp\\chromium-103.0.5060.114.12.zip" --track-download 63838dff7ef198598731032f --hola-domain holavpninstaller.com3⤵
-
C:\Program Files\Hola\app\7za.exe"C:\Program Files\Hola\app\7za.exe" x -o"C:\Program Files\Hola\temp" "C:\\Users\\Admin\\AppData\\Local\\Temp\\chromium-103.0.5060.114.12.zip" "chromium"4⤵
-
C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe"C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.203.908.exe" --post-install-run --no-rmt-conf --app browser --track-download 63838dff7ef198598731032f3⤵
-
C:\Windows\explorer.exeexplorer "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hola Browser.lnk"4⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3760 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=180 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6904 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=182 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4784 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4932 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1488 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5512 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5552 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5748 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=10016 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=190 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7968 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=191 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.b5749c7c0b5fe049 > \\.\pipe\chrome.nativeMessaging.out.b5749c7c0b5fe0492⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.423ad02953995ce4 > \\.\pipe\chrome.nativeMessaging.out.423ad02953995ce42⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=192 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10128 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=193 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.bea4dd307dc06a89 > \\.\pipe\chrome.nativeMessaging.out.bea4dd307dc06a892⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=194 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8208 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=195 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10208 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=196 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10064 /prefetch:12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.d27db8f660ad2547 > \\.\pipe\chrome.nativeMessaging.out.d27db8f660ad25472⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.1d71d644d69797af > \\.\pipe\chrome.nativeMessaging.out.1d71d644d69797af2⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.30255b2b60a8da5f > \\.\pipe\chrome.nativeMessaging.out.30255b2b60a8da5f2⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3152 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7648 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=199 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=200 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2388 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=201 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=316 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=202 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8836 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=203 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=205 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7484 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=204 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7732 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9876 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4796 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7608 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9460 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3436 /prefetch:82⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.2ffcbe361c9a7e8b > \\.\pipe\chrome.nativeMessaging.out.2ffcbe361c9a7e8b2⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-TA25R.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp"C:\Users\Admin\AppData\Local\Temp\is-TA25R.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp" /SL5="$3077C,24626888,780800,C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"3⤵
-
C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe" /SILENT4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-7I4G2.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp"C:\Users\Admin\AppData\Local\Temp\is-7I4G2.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp" /SL5="$30766,24626888,780800,C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe" /SILENT5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-JN4PK.tmp\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\is-JN4PK.tmp\VC_redist.x64.exe" /install /quiet6⤵
-
C:\Windows\Temp\{F4752329-5EAA-438F-BB9C-FE912F6ECA33}\.cr\VC_redist.x64.exe"C:\Windows\Temp\{F4752329-5EAA-438F-BB9C-FE912F6ECA33}\.cr\VC_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\is-JN4PK.tmp\VC_redist.x64.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 /install /quiet7⤵
-
C:\Windows\Temp\{78561BEE-DD97-4DC6-97A4-D97664D1CAA7}\.be\VC_redist.x64.exe"C:\Windows\Temp\{78561BEE-DD97-4DC6-97A4-D97664D1CAA7}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{371BB90B-0375-45DE-B515-B69643BCE091} {B6E2965A-A91C-496D-94E1-0FAC0B329F44} 34008⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.601e90a6d0ed10e4 > \\.\pipe\chrome.nativeMessaging.out.601e90a6d0ed10e42⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-OS5PD.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp"C:\Users\Admin\AppData\Local\Temp\is-OS5PD.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp" /SL5="$4077C,24626888,780800,C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"3⤵
-
C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe"C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe" /SILENT4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-T0P6M.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp"C:\Users\Admin\AppData\Local\Temp\is-T0P6M.tmp\File Marvels.SpiderMan.Miles.Morales.zip ...tmp" /SL5="$508A4,24626888,780800,C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip ...exe" /SILENT5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-JVGKL.tmp\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\is-JVGKL.tmp\VC_redist.x64.exe" /install /quiet6⤵
-
C:\Windows\Temp\{E7544645-5DBE-46ED-AA26-7CA2499BAA7D}\.cr\VC_redist.x64.exe"C:\Windows\Temp\{E7544645-5DBE-46ED-AA26-7CA2499BAA7D}\.cr\VC_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\is-JVGKL.tmp\VC_redist.x64.exe" -burn.filehandle.attached=532 -burn.filehandle.self=540 /install /quiet7⤵
-
C:\Windows\Temp\{84715882-E863-4CBB-B6D6-26C9585F75F4}\.be\VC_redist.x64.exe"C:\Windows\Temp\{84715882-E863-4CBB-B6D6-26C9585F75F4}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{569CA6F1-0D62-4B4F-96E8-22707D05CEC8} {605A5B20-C227-4F3F-B929-FF86AAABEA6F} 60008⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=211 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7860 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=214 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8496 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=213 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7368 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=212 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7608 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7460 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8312 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=217 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7544 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=219 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2476 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=228 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11228 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=227 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11240 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=226 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11112 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=225 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10956 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=224 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10932 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=223 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10816 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=222 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10540 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=221 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10432 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=220 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7652 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=11924 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=11916 /prefetch:82⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.23f8f62377bb3dc8 > \\.\pipe\chrome.nativeMessaging.out.23f8f62377bb3dc82⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=231 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8788 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=232 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10648 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=233 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7868 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=12324 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9608 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=12204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9520 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=11868 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=12476 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7136 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9868 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6828 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=10324 /prefetch:82⤵
-
C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip .. (2).exe"C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip .. (2).exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-UQCSU.tmp\File Marvels.SpiderMan.Miles.Morales.zip .. (2).tmp"C:\Users\Admin\AppData\Local\Temp\is-UQCSU.tmp\File Marvels.SpiderMan.Miles.Morales.zip .. (2).tmp" /SL5="$40874,24626888,780800,C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip .. (2).exe"3⤵
-
C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip .. (2).exe"C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip .. (2).exe" /SILENT4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-GPIRI.tmp\File Marvels.SpiderMan.Miles.Morales.zip .. (2).tmp"C:\Users\Admin\AppData\Local\Temp\is-GPIRI.tmp\File Marvels.SpiderMan.Miles.Morales.zip .. (2).tmp" /SL5="$20AC4,24626888,780800,C:\Users\Admin\Downloads\File Marvels.SpiderMan.Miles.Morales.zip .. (2).exe" /SILENT5⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8248 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8948 /prefetch:82⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.48f31253351d70e0 > \\.\pipe\chrome.nativeMessaging.out.48f31253351d70e02⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.ddecbf793a6080e7 > \\.\pipe\chrome.nativeMessaging.out.ddecbf793a6080e72⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.c9ffcbb85720abdd > \\.\pipe\chrome.nativeMessaging.out.c9ffcbb85720abdd2⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.59e22113273ae9bc > \\.\pipe\chrome.nativeMessaging.out.59e22113273ae9bc2⤵
-
\??\c:\program files\ravantivirus\rsExtensionHost.exe"c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=03⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7288 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=10700 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,17653453979351239072,6444919817714647914,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=10524 /prefetch:82⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /c "c:\program files\ravantivirus\rsExtensionHost.exe" chrome-extension://llbcnfanfmjhpedaedhbcnpgeepdnnok/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.3383acf0f87372dc > \\.\pipe\chrome.nativeMessaging.out.3383acf0f87372dc2⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\RAVAntivirus\x64\rsSyncSvc.exe"C:\Program Files\RAVAntivirus\x64\rsSyncSvc.exe" -rpn:ravantivirus -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v1/live -dt:101⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\AVGBrowserInstaller.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=1003 --default-search=bing.com --adblock-mode-default=0 --make-chrome-default --force-default-win10 --reset-default-win10 --auto-import-data=chrome --import-cookies --auto-launch-chrome --private-browsing --system-level2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=1003 --default-search=bing.com --adblock-mode-default=0 --make-chrome-default --force-default-win10 --reset-default-win10 --auto-import-data=chrome --import-cookies --auto-launch-chrome --private-browsing --system-level3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
-
C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=107.0.19254.108 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff6519c9300,0x7ff6519c9310,0x7ff6519c93204⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe" --system-level --verbose-logging --installerdata="C:\Program Files (x86)\AVG\Browser\Temp\source3936_2063191603\Safer-bin\master_preferences" --create-shortcuts=0 --install-level=14⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=107.0.19254.108 --initial-client-data=0x270,0x274,0x278,0x250,0x27c,0x7ff6519c9300,0x7ff6519c9310,0x7ff6519c93205⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=shortcut-pin-helper /prefetch:8 taskbarpin "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVG Secure Browser.lnk"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=shortcut-pin-helper /prefetch:8 startpin "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVG Secure Browser.lnk"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe" --system-level --make-chrome-default-helper --user-data-dir="C:\Users\Admin\AppData\Local\AVG\Browser\User Data" --module-dir="C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp" "AVG Secure Browser"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{1407C0BF-97EA-4E14-9B49-FE749E06E1F7}\CR_EDB24.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=107.0.19254.108 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff6519c9300,0x7ff6519c9310,0x7ff6519c93205⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler64.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\RAVAntivirus\rsWSC.exe"C:\Program Files\RAVAntivirus\rsWSC.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Program Files\RAVAntivirus\rsClientSvc.exe"C:\Program Files\RAVAntivirus\rsClientSvc.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\RAVAntivirus\rsEngineSvc.exe"C:\Program Files\RAVAntivirus\rsEngineSvc.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
\??\c:\program files\ravantivirus\rsHelper.exe"c:\program files\ravantivirus\rsHelper.exe"2⤵
- Executes dropped EXE
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --minimized --first-run2⤵
- Executes dropped EXE
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\rav-antivirus-client" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 --field-trial-handle=2256,i,9272288059272479224,17704475002630569010,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=es --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\rav-antivirus-client" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2516 --field-trial-handle=2256,i,9272288059272479224,17704475002630569010,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:83⤵
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\rav-antivirus-client" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-path="c:\program files\ravantivirus\ui\resources\app.asar" --enable-sandbox --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2724 --field-trial-handle=2256,i,9272288059272479224,17704475002630569010,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\rav-antivirus-client" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-path="c:\program files\ravantivirus\ui\resources\app.asar" --enable-sandbox --disable-gpu-compositing --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3792 --field-trial-handle=2256,i,9272288059272479224,17704475002630569010,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\rav-antivirus-client" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-path="c:\program files\ravantivirus\ui\resources\app.asar" --enable-sandbox --disable-gpu-compositing --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=4056 --field-trial-handle=2256,i,9272288059272479224,17704475002630569010,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\rav-antivirus-client" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-path="c:\program files\ravantivirus\ui\resources\app.asar" --enable-sandbox --disable-gpu-compositing --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=4284 --field-trial-handle=2256,i,9272288059272479224,17704475002630569010,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
-
\??\c:\program files\ravantivirus\ui\RAVAntivirus.exe"c:\program files\ravantivirus\ui\RAVAntivirus.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\rav-antivirus-client" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3620 --field-trial-handle=2256,i,9272288059272479224,17704475002630569010,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
-
C:\program files\ravantivirus\rsLitmus.A.exe"C:\program files\ravantivirus\rsLitmus.A.exe"2⤵
-
C:\Program Files\Hola\app\net_updater64.exe"C:/Program Files/Hola/app/net_updater64.exe" --updater win_hola.browser.hola.org1⤵
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exe2⤵
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --service1⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v install_ts2⤵
- Modifies registry key
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v install_appid2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v install_campaign2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v uuid2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v after_update2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD HKLM\Software\Hola /v after_update /t REG_SZ /d 1 /f2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v ui_last_premium2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v agree_ts2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v agree_sent2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD HKLM\Software\Hola /v agree_sent /t REG_SZ /d 1 /f2⤵
- Modifies registry key
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v svc_start_history2⤵
- Modifies registry key
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD HKLM\Software\Hola /v svc_start_history /t REG_SZ /d 1669569661242 /f2⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_agreed_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_agreed_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_free2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_free3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_pro_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_pro_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_agreed_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_agreed_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_agreed_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_agreed_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_auto_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_auto_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_vpn_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_vpn_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_opera_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_opera_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_firefox_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_firefox_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_edge_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_edge_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_chrome_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_chrome_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_com_hvpnmobile2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_com_hvpnmobile3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_play2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_play3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_huawei2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_huawei3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_samsung2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_samsung3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_amazon2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_amazon3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_prem2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_prem3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_hola2e2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_hola2e3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_browser_updater2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_browser_updater3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_mac_hola_svc_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_mac_hola_svc_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_org_hola_vpn2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_org_hola_vpn3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ios_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ios_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_agreed_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_nopeer_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_nopeer_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_and_vpn_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_and_vpn_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_agreed_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_noconsent_nopeer_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_noconsent_nopeer_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_browser_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_browser_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2ous_noconsent_nopeer_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2ous_noconsent_nopeer_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2o_noconsent_nopeer_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2o_noconsent_nopeer_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2ous_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2ous_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_h2o_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_h2o_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_svc_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_svc_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_agreed_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_off_abtest_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_off_abtest_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_on_abtest_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_on_abtest_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_auto_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_auto_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_sdk_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_sdk_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_email_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_email_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_banner_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_banner_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_noconsent_nopeer_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_noconsent_nopeer_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_vpn_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_vpn_agreed_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_vpn_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_vpn_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_opera_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_opera_agreed_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_opera_ext_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_opera_ext_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_firefox_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_firefox_agreed_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_firefox_ext_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_firefox_ext_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_edge_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_edge_agreed_noconsent_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_edge_ext_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_edge_ext_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_org_ext2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_org_ext3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_org_p22⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_org_p23⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_ext_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_ext_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_un_ext_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_un_ext_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_in_ext_hola_org2⤵
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_in_ext_hola_org3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_chrome_ext_hola_org2⤵
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_chrome_agreed_noconsent_hola_org2⤵
-
C:\Windows\system32\cmd.execmd /c sc query luminati_net_updater_win_hola_org2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\Software\Hola /v lum_sdk_appid2⤵
- Modifies registry key
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
- Executes dropped EXE
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Program Files\Hola\app\hola_svc.exe"C:\Program Files\Hola\app\hola_svc.exe" --report-idle2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Windows\system32\rasdial.exerasdial2⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3524_409280029\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3524_409280029\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={607f0107-4840-4076-8cd0-343493bdc3f8} --system2⤵
-
C:\Program Files\RAVVPN\rsVPNClientSvc.exe"C:\Program Files\RAVVPN\rsVPNClientSvc.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\RAVVPN\rsVPNSvc.exe"C:\Program Files\RAVVPN\rsVPNSvc.exe"1⤵
-
\??\c:\program files\RAVVPN\ui\RAVVPN.exe"c:\program files\RAVVPN\ui\RAVVPN.exe" --minimized --focused --first-run2⤵
-
\??\c:\program files\RAVVPN\ui\RAVVPN.exe"c:\program files\RAVVPN\ui\RAVVPN.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\RAVVPN" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 --field-trial-handle=2288,i,775997511030436803,9167895234927203990,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
-
\??\c:\program files\RAVVPN\ui\RAVVPN.exe"c:\program files\RAVVPN\ui\RAVVPN.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=es --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\RAVVPN" --mojo-platform-channel-handle=2536 --field-trial-handle=2288,i,775997511030436803,9167895234927203990,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:83⤵
-
\??\c:\program files\RAVVPN\ui\RAVVPN.exe"c:\program files\RAVVPN\ui\RAVVPN.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RAVVPN" --app-path="c:\program files\RAVVPN\ui\resources\app.asar" --enable-sandbox --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2756 --field-trial-handle=2288,i,775997511030436803,9167895234927203990,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
-
\??\c:\program files\RAVVPN\ui\RAVVPN.exe"c:\program files\RAVVPN\ui\RAVVPN.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RAVVPN" --app-path="c:\program files\RAVVPN\ui\resources\app.asar" --enable-sandbox --disable-gpu-compositing --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3760 --field-trial-handle=2288,i,775997511030436803,9167895234927203990,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
-
\??\c:\program files\RAVVPN\ui\RAVVPN.exe"c:\program files\RAVVPN\ui\RAVVPN.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\RAVVPN" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4088 --field-trial-handle=2288,i,775997511030436803,9167895234927203990,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
-
C:\Program Files\Hola\app\net_updater64.exe"C:/Program Files/Hola/app/net_updater64.exe" --updater win_hola.browser.hola.org1⤵
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exe2⤵
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 13890 --screen2⤵
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\temp\net_updater64.exe"C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\temp\net_updater64.exe" --install win_hola.browser.hola.org --remote2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_chrome_ext_hola_org1⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_chrome_agreed_noconsent_hola_org1⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc query luminati_net_updater_win_hola_org1⤵
- Launches sc.exe
-
C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"C:\Users\Admin\Downloads\Hola-Browser-Agreed-Inst-C-Amb3.exe"1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --no-default-browser-check --component-updater=fast-update --start-maximized --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile"2⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Hola\chromium_profile /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Hola\chromium_profile\Crashpad --annotation=plat=Win32 "--annotation=prod=Hola Browser" --annotation=ver=103.0.5060.114 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x69b60498,0x69b604a8,0x69b604b43⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=408 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:23⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=es --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=2108 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=es --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=1848 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=2912 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=3040 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=3048 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3184 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=es --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3924 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3884 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=es --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3016 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=es --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=4728 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=es --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=4828 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=5056 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5084 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5092 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5100 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=5132 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=5144 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --mojo-platform-channel-handle=5384 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --mojo-platform-channel-handle=5392 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --mojo-platform-channel-handle=5408 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --mojo-platform-channel-handle=5172 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --mojo-platform-channel-handle=5176 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3640 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:23⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=es --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3060 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=es --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=5460 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --mojo-platform-channel-handle=6064 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --mojo-platform-channel-handle=6716 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=proxy_resolver.mojom.ProxyResolverFactory --lang=es --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=6984 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=es --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=5924 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5896 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:23⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=es --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --mojo-platform-channel-handle=3044 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:83⤵
-
C:\Program Files\Hola\app\chromium\hola_cr.exe"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Hola\chromium_profile" --extension-process --disable-client-side-phishing-detection --display-capture-permissions-policy-allowed --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=es --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --mojo-platform-channel-handle=5996 --field-trial-handle=1924,i,16011403366777127017,2661755063564755309,131072 /prefetch:13⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 752 -ip 7521⤵
-
C:\Program Files\SaferWeb\rsDNSResolver.exe"C:\Program Files\SaferWeb\rsDNSResolver.exe"1⤵
-
C:\Program Files\Hola\app\net_updater64.exe"C:/Program Files/Hola/app/net_updater64.exe" --updater win_hola.browser.hola.org1⤵
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exe2⤵
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 92924 --screen2⤵
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 791852⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /c1⤵
- Checks computer location settings
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /cr2⤵
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler.exe"2⤵
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1207.2\AVGBrowserCrashHandler64.exe"2⤵
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ua /installsource scheduler1⤵
-
C:\Program Files\SaferWeb\rsDNSClientSvc.exe"C:\Program Files\SaferWeb\rsDNSClientSvc.exe"1⤵
-
C:\Program Files\SaferWeb\rsDNSSvc.exe"C:\Program Files\SaferWeb\rsDNSSvc.exe"1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\pipe\crashpad_4996_IOTSMYYEXFIEJGYKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/752-309-0x0000000000000000-mapping.dmp
-
memory/1076-216-0x0000000000000000-mapping.dmp
-
memory/1152-318-0x0000000000000000-mapping.dmp
-
memory/1352-179-0x0000000000000000-mapping.dmp
-
memory/1376-253-0x0000000000000000-mapping.dmp
-
memory/1392-326-0x0000000000000000-mapping.dmp
-
memory/1416-136-0x0000000002F01000-0x0000000002F03000-memory.dmpFilesize
8KB
-
memory/1416-149-0x0000000004F71000-0x0000000004F73000-memory.dmpFilesize
8KB
-
memory/1416-147-0x0000000002251000-0x0000000002253000-memory.dmpFilesize
8KB
-
memory/1416-134-0x0000000000000000-mapping.dmp
-
memory/1428-224-0x0000000000000000-mapping.dmp
-
memory/1612-237-0x0000000000000000-mapping.dmp
-
memory/1708-186-0x0000000000000000-mapping.dmp
-
memory/1724-339-0x0000000000000000-mapping.dmp
-
memory/1788-204-0x0000000000000000-mapping.dmp
-
memory/2024-217-0x0000000000000000-mapping.dmp
-
memory/2056-263-0x00000215A3190000-0x00000215A33BA000-memory.dmpFilesize
2.2MB
-
memory/2056-254-0x0000000000000000-mapping.dmp
-
memory/2056-260-0x0000021587F20000-0x0000021587F7A000-memory.dmpFilesize
360KB
-
memory/2056-258-0x00000215A24F0000-0x00000215A2544000-memory.dmpFilesize
336KB
-
memory/2056-257-0x0000021588330000-0x0000021588356000-memory.dmpFilesize
152KB
-
memory/2056-256-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/2056-255-0x0000021587F20000-0x0000021587F7A000-memory.dmpFilesize
360KB
-
memory/2056-261-0x0000021589C70000-0x0000021589CA2000-memory.dmpFilesize
200KB
-
memory/2056-262-0x00000215A2B70000-0x00000215A3188000-memory.dmpFilesize
6.1MB
-
memory/2056-264-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/2268-133-0x0000000000000000-mapping.dmp
-
memory/2496-205-0x0000000000000000-mapping.dmp
-
memory/2588-178-0x0000000000000000-mapping.dmp
-
memory/2732-232-0x0000000000000000-mapping.dmp
-
memory/2760-227-0x0000000000000000-mapping.dmp
-
memory/2804-317-0x0000000000000000-mapping.dmp
-
memory/2844-236-0x0000000000000000-mapping.dmp
-
memory/3144-245-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/3144-238-0x0000000000000000-mapping.dmp
-
memory/3144-242-0x00000146DEC10000-0x00000146DEC1A000-memory.dmpFilesize
40KB
-
memory/3144-240-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/3144-239-0x00000146DE880000-0x00000146DE8AE000-memory.dmpFilesize
184KB
-
memory/3144-244-0x00000146F8D80000-0x00000146F8DBC000-memory.dmpFilesize
240KB
-
memory/3144-243-0x00000146E0540000-0x00000146E0552000-memory.dmpFilesize
72KB
-
memory/3144-241-0x00000146DE880000-0x00000146DE8AE000-memory.dmpFilesize
184KB
-
memory/3228-320-0x0000000000000000-mapping.dmp
-
memory/3400-135-0x0000000000000000-mapping.dmp
-
memory/3400-206-0x0000000000000000-mapping.dmp
-
memory/3408-315-0x0000000000000000-mapping.dmp
-
memory/3448-219-0x00007FFA90940000-0x00007FFA90950000-memory.dmpFilesize
64KB
-
memory/3448-218-0x0000000000000000-mapping.dmp
-
memory/3448-220-0x00007FFA90940000-0x00007FFA90950000-memory.dmpFilesize
64KB
-
memory/3500-274-0x0000000000000000-mapping.dmp
-
memory/3588-189-0x000001D5A9880000-0x000001D5A9902000-memory.dmpFilesize
520KB
-
memory/3588-215-0x000001D5C3FA0000-0x000001D5C3FBE000-memory.dmpFilesize
120KB
-
memory/3588-272-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/3588-201-0x000001D5C3EC0000-0x000001D5C3ECE000-memory.dmpFilesize
56KB
-
memory/3588-200-0x000001D5C4050000-0x000001D5C4152000-memory.dmpFilesize
1.0MB
-
memory/3588-207-0x000001D5C3FC0000-0x000001D5C4000000-memory.dmpFilesize
256KB
-
memory/3588-208-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/3588-188-0x0000000000000000-mapping.dmp
-
memory/3588-193-0x000001D5AB400000-0x000001D5AB40A000-memory.dmpFilesize
40KB
-
memory/3588-192-0x000001D5C3C20000-0x000001D5C3C4E000-memory.dmpFilesize
184KB
-
memory/3588-190-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/3588-191-0x000001D5AB410000-0x000001D5AB440000-memory.dmpFilesize
192KB
-
memory/3588-214-0x000001D5C4680000-0x000001D5C46F6000-memory.dmpFilesize
472KB
-
memory/3588-194-0x000001D5C3E40000-0x000001D5C3E78000-memory.dmpFilesize
224KB
-
memory/3588-198-0x000001D5C3E80000-0x000001D5C3EAE000-memory.dmpFilesize
184KB
-
memory/3700-235-0x0000000000000000-mapping.dmp
-
memory/3776-350-0x0000000000000000-mapping.dmp
-
memory/3776-226-0x0000000000000000-mapping.dmp
-
memory/3812-211-0x0000000000000000-mapping.dmp
-
memory/3840-182-0x0000000000000000-mapping.dmp
-
memory/3840-183-0x000001E9CB2F0000-0x000001E9CB2F8000-memory.dmpFilesize
32KB
-
memory/3840-184-0x000001E9E5B00000-0x000001E9E6028000-memory.dmpFilesize
5.2MB
-
memory/3840-185-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/3840-197-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/3852-328-0x0000000000000000-mapping.dmp
-
memory/3936-212-0x0000000000000000-mapping.dmp
-
memory/3956-230-0x0000000000000000-mapping.dmp
-
memory/4024-279-0x000001DACEC10000-0x000001DACEC76000-memory.dmpFilesize
408KB
-
memory/4024-273-0x000001DACE5A0000-0x000001DACE5CE000-memory.dmpFilesize
184KB
-
memory/4024-282-0x000001DACF320000-0x000001DACF38C000-memory.dmpFilesize
432KB
-
memory/4024-266-0x000001DAB5A60000-0x000001DAB5A84000-memory.dmpFilesize
144KB
-
memory/4024-280-0x000001DACEC80000-0x000001DACECBA000-memory.dmpFilesize
232KB
-
memory/4024-267-0x000001DACE320000-0x000001DACE352000-memory.dmpFilesize
200KB
-
memory/4024-284-0x000001DACF4D0000-0x000001DACF536000-memory.dmpFilesize
408KB
-
memory/4024-268-0x000001DACE470000-0x000001DACE4A2000-memory.dmpFilesize
200KB
-
memory/4024-269-0x000001DACE4B0000-0x000001DACE4E6000-memory.dmpFilesize
216KB
-
memory/4024-270-0x000001DACE530000-0x000001DACE568000-memory.dmpFilesize
224KB
-
memory/4024-271-0x000001DACE570000-0x000001DACE598000-memory.dmpFilesize
160KB
-
memory/4024-285-0x000001DACF7D0000-0x000001DACF80A000-memory.dmpFilesize
232KB
-
memory/4024-281-0x000001DACEBD0000-0x000001DACEBF6000-memory.dmpFilesize
152KB
-
memory/4024-265-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/4024-278-0x000001DACF540000-0x000001DACF7C6000-memory.dmpFilesize
2.5MB
-
memory/4024-277-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/4024-275-0x000001DACEB40000-0x000001DACEB9E000-memory.dmpFilesize
376KB
-
memory/4164-199-0x0000000000000000-mapping.dmp
-
memory/4260-247-0x0000000000000000-mapping.dmp
-
memory/4460-196-0x0000000000000000-mapping.dmp
-
memory/4500-233-0x0000000000000000-mapping.dmp
-
memory/4604-286-0x0000000000000000-mapping.dmp
-
memory/4760-246-0x0000000000000000-mapping.dmp
-
memory/4816-222-0x0000000000000000-mapping.dmp
-
memory/5108-202-0x0000000000000000-mapping.dmp
-
memory/5132-354-0x0000000000000000-mapping.dmp
-
memory/5160-195-0x0000000000000000-mapping.dmp
-
memory/5208-228-0x0000000000000000-mapping.dmp
-
memory/5228-173-0x0000000000400000-0x00000000004ED000-memory.dmpFilesize
948KB
-
memory/5228-169-0x0000000000400000-0x00000000004ED000-memory.dmpFilesize
948KB
-
memory/5228-168-0x0000000000000000-mapping.dmp
-
memory/5228-171-0x0000000000400000-0x00000000004ED000-memory.dmpFilesize
948KB
-
memory/5264-210-0x0000000000000000-mapping.dmp
-
memory/5296-283-0x00007FFA5E920000-0x00007FFA5F356000-memory.dmpFilesize
10.2MB
-
memory/5296-276-0x0000000000000000-mapping.dmp
-
memory/5320-234-0x0000000000000000-mapping.dmp
-
memory/5344-225-0x00007FFA90940000-0x00007FFA90950000-memory.dmpFilesize
64KB
-
memory/5344-221-0x0000000000000000-mapping.dmp
-
memory/5380-209-0x0000000000000000-mapping.dmp
-
memory/5808-174-0x00000000068C0000-0x00000000068CF000-memory.dmpFilesize
60KB
-
memory/5808-172-0x0000000000000000-mapping.dmp
-
memory/5852-203-0x0000000000000000-mapping.dmp
-
memory/5872-231-0x0000000000000000-mapping.dmp
-
memory/5884-187-0x0000000000000000-mapping.dmp
-
memory/5944-213-0x0000000000000000-mapping.dmp
-
memory/5968-352-0x0000000000000000-mapping.dmp
-
memory/6020-176-0x00000000023E1000-0x00000000023E5000-memory.dmpFilesize
16KB
-
memory/6020-175-0x0000000000000000-mapping.dmp
-
memory/6020-181-0x0000000006371000-0x0000000006375000-memory.dmpFilesize
16KB
-
memory/6032-166-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-162-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-156-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-151-0x0000000000E90000-0x0000000000EF5000-memory.dmpFilesize
404KB
-
memory/6032-167-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-165-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-161-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-159-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-158-0x0000000000400000-0x0000000000D6D000-memory.dmpFilesize
9.4MB
-
memory/6032-157-0x0000000000E91000-0x0000000000EC6000-memory.dmpFilesize
212KB
-
memory/6032-148-0x0000000000000000-mapping.dmp
-
memory/6052-229-0x0000000000000000-mapping.dmp
-
memory/6064-177-0x0000000000000000-mapping.dmp
-
memory/6096-250-0x00000188FE080000-0x00000188FE1FC000-memory.dmpFilesize
1.5MB
-
memory/6096-248-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/6096-249-0x00000188FDD10000-0x00000188FE076000-memory.dmpFilesize
3.4MB
-
memory/6096-252-0x00000188E5190000-0x00000188E51B2000-memory.dmpFilesize
136KB
-
memory/6096-251-0x00000188E5130000-0x00000188E514A000-memory.dmpFilesize
104KB
-
memory/6096-259-0x00007FFA71570000-0x00007FFA72031000-memory.dmpFilesize
10.8MB
-
memory/7160-380-0x00007FFA5EAB0000-0x00007FFA5F4E6000-memory.dmpFilesize
10.2MB
-
memory/7844-553-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/8264-567-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/8696-549-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/8736-541-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/10016-547-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB