Resubmissions
31-07-2023 21:19
230731-z6ktbscc5y 1031-07-2023 21:15
230731-z38e8abc24 1031-07-2023 20:42
230731-zgyznaca71 10Analysis
-
max time kernel
165s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2023 21:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anonfiles.com/veD8905azb/CleanerPRO_exe
Resource
win10v2004-20230703-en
General
-
Target
https://anonfiles.com/veD8905azb/CleanerPRO_exe
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1135301000903798794/tfVQoSZpkXvLUOTlyqt0C1zY7IPEFfwVUDewg50Fh9yJBzmQ7JliXpoxbHulxNWIJeY4
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
CDS.execrypted.exeCDS.execrypted.exepid process 5412 CDS.exe 5628 crypted.exe 2380 CDS.exe 7160 crypted.exe -
Loads dropped DLL 2 IoCs
Processes:
CDS.exeCDS.exepid process 5412 CDS.exe 2380 CDS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
CleanerPRO (1).exeCleanerPRO (1).exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" CleanerPRO (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" CleanerPRO (1).exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 513 freegeoip.app 514 freegeoip.app 519 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133353120017648107" chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.execrypted.execrypted.exetaskmgr.exeCDS.exeCDS.exepid process 1108 chrome.exe 1108 chrome.exe 5628 crypted.exe 5628 crypted.exe 5628 crypted.exe 5628 crypted.exe 5628 crypted.exe 7160 crypted.exe 7160 crypted.exe 7160 crypted.exe 7160 crypted.exe 7160 crypted.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 5412 CDS.exe 5412 CDS.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 2380 CDS.exe 2380 CDS.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 4092 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 42 IoCs
Processes:
chrome.exepid process 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeCreatePagefilePrivilege 1108 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
CDS.exeCDS.exepid process 5412 CDS.exe 5412 CDS.exe 2380 CDS.exe 2380 CDS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1108 wrote to memory of 1260 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 1260 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 4076 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 668 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 668 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe PID 1108 wrote to memory of 2348 1108 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://anonfiles.com/veD8905azb/CleanerPRO_exe1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cdea9758,0x7ff9cdea9768,0x7ff9cdea97782⤵PID:1260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:22⤵PID:4076
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:2348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:2212
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:3800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4940 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:4940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:4712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5340 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5104 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:3800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5040 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:3532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5384 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4624 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:3632
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5812 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:2420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6044 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:1800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6208 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:748
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4952 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:3728
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=6376 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=7032 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:2540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=6700 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:2424
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6224 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:1416
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6344 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:2580
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6048 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:3760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6412 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:4996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6044 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:4160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=7832 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=7828 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5276
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=7736 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5268
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=7620 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=7520 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=6344 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=7500 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5676
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=8424 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=8752 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=8900 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=9072 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --mojo-platform-channel-handle=8356 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6132
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=9020 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6124
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --mojo-platform-channel-handle=9420 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6196
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --mojo-platform-channel-handle=9300 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6240
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --mojo-platform-channel-handle=9580 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6392
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=8924 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --mojo-platform-channel-handle=9960 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=10016 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9716 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:6964
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --mojo-platform-channel-handle=8340 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6976
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=9596 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:6956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --mojo-platform-channel-handle=9004 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --mojo-platform-channel-handle=8816 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:6608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --mojo-platform-channel-handle=8028 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5848
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --mojo-platform-channel-handle=8036 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --mojo-platform-channel-handle=9736 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --mojo-platform-channel-handle=9752 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:12⤵PID:5708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=10124 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:6364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1588 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:6108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=10104 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:6796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9576 --field-trial-handle=1888,i,14503867492792397256,16846177846022169914,131072 /prefetch:82⤵PID:5512
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2508
-
C:\Users\Admin\Desktop\CleanerPRO (1).exe"C:\Users\Admin\Desktop\CleanerPRO (1).exe"1⤵
- Adds Run key to start application
PID:5464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5628
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x35c 0x4f81⤵PID:2552
-
C:\Users\Admin\Desktop\CleanerPRO (1).exe"C:\Users\Admin\Desktop\CleanerPRO (1).exe"1⤵
- Adds Run key to start application
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CDS.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:7160
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52934de35071d5605cbf20179fa5d22c0
SHA1a7409cd000d3b70c16cae402a141b340664878d3
SHA256b713f7f6b997efb61425b3a90944dbea72165e8cb45e1b75ab4e0d5b9ec5c743
SHA51275346b57c055c052740096628a7dedc29e46c26f71ad2d64967a48fc22ba92261556272ea29c3f9ed51825e422230a737eec0f817d71d0881f74fbe30c3b6247
-
Filesize
1KB
MD583e4672379b12e33bc61dca6ec07f31c
SHA18e5ec30105f9f446ddd3bc5281ef84d0dfc93acd
SHA256bfb9b3945d977d5d4820ad80ab3bbf66fcde5177a283c480badf5200ab9afb3f
SHA512ad8796a9459d6d9255dd1f4ca47a8f430ce48089dcd2ab75aae41967d8e35f68d09ed90fcd40faac331fde790375a307b6742489d2c5ff40f9e44d8ed73fae65
-
Filesize
1KB
MD583e4672379b12e33bc61dca6ec07f31c
SHA18e5ec30105f9f446ddd3bc5281ef84d0dfc93acd
SHA256bfb9b3945d977d5d4820ad80ab3bbf66fcde5177a283c480badf5200ab9afb3f
SHA512ad8796a9459d6d9255dd1f4ca47a8f430ce48089dcd2ab75aae41967d8e35f68d09ed90fcd40faac331fde790375a307b6742489d2c5ff40f9e44d8ed73fae65
-
Filesize
456B
MD5f14e5f66f14588ab8dd81dc75b37ce44
SHA1e808365669b56597a6c5bfa9509f9d3230b284ab
SHA2560284f9c7c944cdf5c8175a5d3c70294decee6b625cf84c70b5402273c069e876
SHA512a28d54af346fa220ce6c7b5daa7417002bfeeade37adfe390e922fcef9291a68bfecd7661cf9cf23aeee3d57825954c76ac08845de2ecc5a5adafb48b198f13f
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
264KB
MD549d4a9edeb012a266f176b804ebcfa07
SHA17991adf915a2c12478f5a5658137485f742c70c1
SHA256883ebb5f6ec6cd42854a00c99ecafafe49a8c559a7bb0a0d1a8607b9df8663c5
SHA512d8f1ce8b626e68772f25365c0dcc1a296c517cfce5cfb85656d6b596078e360b39c4e5bf8bce144c8614131bee14a201e5611bdc9c9a261286913a78358b3c4d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\4f7c18aa-5461-46fc-a480-99cff61d44b2.tmp
Filesize11KB
MD5dc8fdfbf65398ecfeb1755ece763c235
SHA1b0b6bd50de998be77c20cbd24f39cc13f57d3f66
SHA256679e1893724ef03bb084a72bfe89ea36040c7f4e626593a72ee0c43f81a321c2
SHA5127d84f089a0d44047609d9ec3a4a18b85cd8fcc4520f25b6cf129fedebca311ef693b42495ca8bf90ed5c6504a704de8ad2fb6f80678535f8ebcadbe5b9e7f785
-
Filesize
539B
MD5e532d9d1b9756597de7d999e9dc8ed67
SHA16c816af5965ca80bdbb5f2335e38e8457d569db5
SHA256818f3525a3a0ae7a7ac9ecb15fd435cb65a83953156546f132e058fddff622eb
SHA512ae125ac4bacfb50aba957b079d83e166cf5848c1679faf52486f5e5674bab925c2be78a271a8e6d3335d68ba6aeba6c2046098749e92eda41d27bf7f7fd9f7ed
-
Filesize
2KB
MD54d042f1ef0da0c2f0ffb719520cf7aa3
SHA1357a2a7b0f925d15bb8036f87ee4d2d11944d255
SHA2568f9e26700000b31555b1bc24a342f46c712e7c0433aa8a95a02bf7927dd30282
SHA512f7967fc49eb973a5b207c3ef0c2edad2d6734a4759d471c70097749d989ac79bca75a42ac7b2324eb140781c62fb05562c2326518fa244390db427991107b575
-
Filesize
4KB
MD50fd5f8fd567caffd6046ce6f062da129
SHA11471bbf144e20fffed099d4aca0aad3973ce6259
SHA256cdd5cbd479c9a2617341c95b5a376dff410525166d1442e0873471358bdc0947
SHA5129e446e0766b6b0f7e184050c27c65b6b64658e5c7966a4f13b12d4c76c3c8de9092f3805cd4daec7bc70e2ccfc7c5bf4945b5ae4a92062c3ecf61a74120fddb2
-
Filesize
7KB
MD50e8daf6ff2a794f8fdeb416ebac0d62d
SHA10ffb2ada33f32bd806b6bbaee9bfc9f91b4c4504
SHA256193068d7ce2af285213c48945e73bb36f744b206a9b5afa1be4886ecf72a6558
SHA5121d10aa775ffbd5729c9ad5aebd0bf8111af7c9fec0254f668f83f71738d1ed0cd0504b7e083c1f587aa5d6e565d73ea252b8377e9aa8bf3deae0576e2559e1e5
-
Filesize
7KB
MD5aafef8d0e35a7255ba97f210057930cd
SHA1dc7c0b5ef60729e8ed0ea8268386a406fb0310b2
SHA256d553e5efeca8b9830abeebc6a7197e7e0b721610810b683c2fa17c07c1e1cbb6
SHA512217c7c9c43ca2a75a8846a9cae7923c02e19f53c25e412b539a6325622a0c2dc34f4279724cb886f25f78408683b3d8ef4b59bdaca851bfb5e2465ce138182bb
-
Filesize
6KB
MD55031269288679a7f50bde58cf616e495
SHA170d2ab17905e6592bed59ee58765bacc04e1e60c
SHA256b8ff01fdca9037e73b4377b06a2db0015dc1d8f5b81edab783ec4c1b730052f8
SHA512b9ca85771301b96122bbde380a2878e8ab58e1849527eae219cc6aebcabcf24cf9ed98df2e1d4581f154f46c8940cfd16d769c1eadba7a7be010f99d0345f1a0
-
Filesize
6KB
MD56288a766fd8cb4be6f55a8e035d62463
SHA123d52a372f18227ba269243836db83dbd9b8a624
SHA256ffd57dde6bcd3ae4d38f2fc7f00f387119aa2da826dc5931b1889f9c8914406b
SHA5121da121ce083b04b67cb0de6db299dfe3f8039c853df0daa6eb81b7a4d7b9272bd0d565e037a4bcbbc74be2d1903bc541fc41338ca934f1752ea263e5ef10f22a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD54c5d4f51a3edb62f5d6dbb072703269d
SHA18043802d3426d40a6bb1366a0a3113136ac85c7d
SHA256ab3ba3e1149594fcb250423070cad3b19b8dcbeea911538701b38bcb48e2f018
SHA5126789a9c06c0bf723c4c632076a1fa4fbd33f6dbfa7db37d72b9aa76b5689ab088ba6723b526518a32cfcb3fc028038d345da65aade65eb88cd5bc602f87f1f71
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d939.TMP
Filesize48B
MD5c60cbe0bc7455d9aaa3fa00baff79cd1
SHA16a84f878fd317b72ae2f07828ee0770c7ec345a5
SHA2564a6afb0935f8d580fa5fe9589613390d15fd0f3370f83ee027a0c848bd9e18b4
SHA512029811a7cabe936fc2c9bf6942d2421d372ccdb8f2fa4cd69ad736a42e6bec8cc77595c6ec3aec2628e59f9bb79cb1d7309b8f1e9bdfac9989c54587e7b4d29e
-
Filesize
87KB
MD556eb5890d907d86af6882401e1549100
SHA1bdd141e669ff84307159d8cb914c36b1301ee63a
SHA2564eab441f774ec4e8c9606cb79f883d84b2c57f811bfc8aed42bfe0e05383e26d
SHA5123e245cd90df2bcc382405ad94446d12a96610fa61babaa19e810534aa03a33a33e02dcc0f84cb751d5a0ac380ce56bf656e41b981c7f9d72f2a79479aadc58b3
-
Filesize
87KB
MD52cf6965d88cb0c7fcef1cfdf896a31bf
SHA1e173d8f7fe3fbf4659f2c879c4be03fc4b6dae0e
SHA25697e88613de8e767184b34a39cee1a9ed174839251c6503839fbbc5b269295e86
SHA5124fba3454a0f932e982101d809abaa91683d68922e588c6364bcb676f6cc67669259113793c0e4c79d256130fdf3a9c05a52624cfa8cd8baedd4bad8f17b00358
-
Filesize
87KB
MD52dab0400a57be6d590efbc1085b4dc22
SHA1737fc0a8e6e7f3ce70fd7256b8bde885016a5809
SHA2561000dd41b422b35a20bf6ab0109748455fc338496a3526f95db7ff69846c18ea
SHA512542f7151eb00c6ea6c055a82957d00083cdbd0001e0a2117c8668d82817b18f9ea8f2c9fd90897b6d25ad9c369b7c6f64116d922c3932e107f66e85efa8d2be6
-
Filesize
87KB
MD575405ef6c84b7762c84c567e4f513b9e
SHA1444199a599900fe9730f1103a5b5c91fc42145d7
SHA2563e173f7fabdf120227879059af20abeff210fa545a10a80bd7ca3ed099609f1e
SHA512edb2289337ff4cbbca83be51834dc2ec3c9ced49e47068a19f4ef6d5d4879a3cb965981cbafaabfd17285c2c4ef574dd8ff6e817e08fd7810f13904c8a5036b2
-
Filesize
107KB
MD506f7717fcc6a0953cfa3ba8e25529c07
SHA15b9c6eb955027b4fb41aac224d3dc685153a5f93
SHA256023f896e3ffeb4e0b988c666ff5b1d8d98bf24f678af7134374f9fe4fd4d3e7f
SHA5121b5b34de182f526d3a7d7b1ba3d0f392c48d2fd1facb6a01cb779e31ecfc9bb5b44f19b72db735680ff3ee58166f51c9c395ceff8b87098f83e1cb1afd5f4f4b
-
Filesize
101KB
MD557a408a1f4fa9a315fa17da281236770
SHA19871c3cbf4c3c07feee9715ffa376fee8caa3c87
SHA256987815194aadb2717c4b11ad169cac883fe523e59c4bcb4f6854062b1cc70d7b
SHA5128cfe0691fede1cc2e0432c47090e6ca86a26bc93bd1cadc13010b15064cb78a63f0e91330bafd8f6314dcd1bfd26817d24c119c47cf08dcf9eafe4bb698ffe15
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2KB
MD5340b294efc691d1b20c64175d565ebc7
SHA181cb9649bd1c9a62ae79e781818fc24d15c29ce7
SHA25672566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9
SHA5121395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d
-
Filesize
13KB
MD53e7ecaeb51c2812d13b07ec852d74aaf
SHA1e9bdab93596ffb0f7f8c65243c579180939acb26
SHA256e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96
SHA512635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d
-
Filesize
6.1MB
MD5424bf196deaeb4ddcafb78e137fa560a
SHA1007738e9486c904a3115daa6e8ba2ee692af58c8
SHA2560963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2
SHA512a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797
-
Filesize
6.1MB
MD5424bf196deaeb4ddcafb78e137fa560a
SHA1007738e9486c904a3115daa6e8ba2ee692af58c8
SHA2560963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2
SHA512a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797
-
Filesize
3KB
MD593270c4fa492e4e4edee872a2b961dde
SHA17b3c079d55d00aa5390662f0a2059e60546ed003
SHA25625d49cbbd65d48ad462455f1143f73ee997df8f747e7d2213daab18e321c028b
SHA5123d12721eb229d9227efc51c8e93d5f3ff6cabc305b643b764fcd6da76c031db4c8218b76b1f6158891995f23ce323c13826f59477924361cfb0dee2b9f94fb42
-
Filesize
3KB
MD5fc2a595f574b1ead82a6dcf06492c985
SHA1400626784368fb9825a954ab8e14238054a277d1
SHA256ee9a4903a8df90eff4c5b65a8073e564a3581cf73772a72eb82396e69932e769
SHA51206506e70170a85a2d697550bfb555a19e210e93b972a38a482448cf8eca335605583d04f74f5fdd2911203c58aaca2f55b946c2dfe754ecf17c6b1763b7e37db
-
Filesize
3KB
MD5967fdfe0a01c083804673b4976ad6730
SHA15d05ade6dd0d1d67ea7879cd8f7779ef53abbd4c
SHA25672eda9d49bcd0cd3b540f75c4215714378afbb1ce40afcbb7a0b246ab2a44f21
SHA51250acacf15fa4cfa8319f789fb534cdb4a8d559ceb3e5e832b32015ff2fbee2c3902abfc83bc2493d57298ed32d0aeb6817e077758c4c2c956432b1d3f3c738d4
-
Filesize
436KB
MD51d5698b4e2dd3435d103865e881aa2dd
SHA1d1cce8983325f009f859c24904ac3bc6c0d082ad
SHA256064167b67acebca10b61531c2b8a6bc1539406f15002a2f56f3f8ecd29b10890
SHA512088b3a42cc13c10f3867b13243170a97b9aaf7c1bd16d574f27ddee53e0ced62c5a643df2b03840676b621db6b001aa14e184ca6b27e657fbe5697bad43e7c4a
-
Filesize
274KB
MD58bdeab09d65671944b03ddc52213075a
SHA146bdafac16106cb574c3e8e1dfe26bb5faa4365a
SHA256b1fb691669ce27ea6f687a6a4f08109a9fefcbe5114fab516737a8526bf1772c
SHA512686d5178c14224cebb288150bf486e54b85468642125f4bcefd740bd4f177b847b9c0b0627774b474c3b1e00e5db65d8a9211991425b5f04a2d4149543739c35
-
Filesize
322KB
MD5c3256800dce47c14acc83ccca4c3e2ac
SHA19d126818c66991dbc3813a65eddb88bbcf77f30a
SHA256f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866
SHA5126865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25
-
Filesize
322KB
MD5c3256800dce47c14acc83ccca4c3e2ac
SHA19d126818c66991dbc3813a65eddb88bbcf77f30a
SHA256f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866
SHA5126865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25
-
Filesize
11KB
MD57fa818f532effd80cf7c1c54676e5a0d
SHA105ce44c8d0672c9f3ce66436c592442377e69dba
SHA2561c2d1ba8425139d45de89192d2ae4982e9581f8ae0f22b8497aa0055080237ca
SHA51238baed895bc71bb890e91a92909f6e78ad34569ce6c7efd8bd9db50080da22697a085f98a3465c3e31165fb9029644e5a0f6bc5ba17d71d7f0dcd31784f0811d
-
Filesize
6.1MB
MD5424bf196deaeb4ddcafb78e137fa560a
SHA1007738e9486c904a3115daa6e8ba2ee692af58c8
SHA2560963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2
SHA512a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797
-
Filesize
92KB
MD5395af5c6fe8e84f27b3be9b1a95e412d
SHA1386230fc368fff5ba685322a8177ebecd9a665e1
SHA2564c8984d8400a8ea0c4f407c91c9e2be623b6bbbb0d4f418a7ccee8f1c96f6ae6
SHA512376116e25f7b5d10b724c1a9ca40aebf17bdd386b9858ef34b05c66454984b88f09978484f770e2cdc477cf2a0025a35a8b9c8f196c2aa86d5c68a44d0388a7b
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1KB
MD5e582bfed8e75e4cc3a7a3999ad24c826
SHA10c75b75f1fc769a53efd08d2f06b5e8420388ed5
SHA256d597a3f9bf87404198f460126ce4a0aa460c153e3b8e0e2ef29b9ccf081725fa
SHA512f216b92d86f122c5f104312765c06c509eeca755fc9aa09c959f122d313fa59655fbec1ff9e0474730796573501a0f02bc120d3485ae8c45c4c519d809191834
-
Filesize
1KB
MD5e582bfed8e75e4cc3a7a3999ad24c826
SHA10c75b75f1fc769a53efd08d2f06b5e8420388ed5
SHA256d597a3f9bf87404198f460126ce4a0aa460c153e3b8e0e2ef29b9ccf081725fa
SHA512f216b92d86f122c5f104312765c06c509eeca755fc9aa09c959f122d313fa59655fbec1ff9e0474730796573501a0f02bc120d3485ae8c45c4c519d809191834
-
Filesize
1KB
MD5e582bfed8e75e4cc3a7a3999ad24c826
SHA10c75b75f1fc769a53efd08d2f06b5e8420388ed5
SHA256d597a3f9bf87404198f460126ce4a0aa460c153e3b8e0e2ef29b9ccf081725fa
SHA512f216b92d86f122c5f104312765c06c509eeca755fc9aa09c959f122d313fa59655fbec1ff9e0474730796573501a0f02bc120d3485ae8c45c4c519d809191834
-
Filesize
1KB
MD5e582bfed8e75e4cc3a7a3999ad24c826
SHA10c75b75f1fc769a53efd08d2f06b5e8420388ed5
SHA256d597a3f9bf87404198f460126ce4a0aa460c153e3b8e0e2ef29b9ccf081725fa
SHA512f216b92d86f122c5f104312765c06c509eeca755fc9aa09c959f122d313fa59655fbec1ff9e0474730796573501a0f02bc120d3485ae8c45c4c519d809191834
-
Filesize
3.3MB
MD5ec0b4c26779016781243dcb85d00655b
SHA1a278fa2f8361efdf8e9367b57313ea6ff495dd21
SHA25660566296e36573b439ab99a326fceee72a5e54664c31b57ab47c8afb9a3783ee
SHA51236023bba6b47a47bcaf644936a67f970e6a614dbc49ec1e2f251507eceed6c67819a7cb2fd365ee540f1cf547fcf239c60843196083939394d0c8052cd7b2b3a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e