Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
When PUPs Grow Fangs: Dragon Boss Solutions Left an Open Door on 25,000+ Endpoints
Published:
April 14, 2026

When PUPs Grow Fangs: Dragon Boss Solutions Left an Open Door on 25,000+ Endpoints

By:
James Northey
Ryan Dowd
Share icon
Glitch effectGlitch effectGlitch effect


Acknowledgments: Special thanks to Lindon Wass and Michael Elford for their contributions to this research and blog.


Background

Early in the morning on Sunday, the 22 March, what appeared to be standard adware started triggering alerts across multiple environments managed by Huntress. The executables were using an update mechanism to conceal a multi-stage attack chain designed to systematically disable security tools.

These executables were signed by Dragon Boss Solutions LLC, a company claiming to conduct "search monetization research." The signed software silently fetches and executes payloads capable of killing antivirus products, all while running with SYSTEM privileges.

Huntress observed the antivirus killing capability starting in late March 2025, although the loaders/updaters dated back to late 2024. The operation uses an off-the-shelf software update mechanism to deploy these MSI and PowerShell-based payloads. Establishing WMI persistence, it disables security applications, and blocks reinstallation of protective software.

More concerning is it turned out to have an open door baked right into its update configuration, one which anyone with $10 could have walked straight through. 

Attack flow overview


Figure 1: Diagram showing attack path


Setting the stage

Most adware/potentially unwanted programs (PUP) don’t get a blog post written about them, because they are extremely common and, frankly, boring. At face value this is aggressive adware protecting its revenue stream, however in this case, the combination of AV killing focus and some unregistered domains stood out to us and prompted us to dig in further. 

The update mechanism can deploy any payload. At the moment it's an AV killer, but tomorrow it could be ransomware, a cryptominer, or an infostealer. The infrastructure is already in place and now there's no AV watching.

What increases this risk is the primary update domain baked into the operation - chromsterabrowser[.]com - is unregistered. Anyone who registers it gains the ability to push updates to hosts running Dragon Boss Solutions software. This transforms a PUP infection into a potential supply chain compromise.

Fortunately, Huntress found this domain first. So we registered it ourselves, pointed it to a sinkhole, and within hours watched tens of thousands of compromised endpoints reach out looking for instructions that, in the wrong hands, could have been anything.



Initial discovery

Our investigation began with two WMI persistence signals.

The naming convention raised concerns: "Mb" refers to Malwarebytes, and "Removal" speaks for itself.


Figure 2: Initial detections for persistence

The next clue was a burst of scheduled task creation events just prior to the WMI detections. Four tasks were registered in rapid succession, all pointing to the same PowerShell file:


Figure 3: Further detections for deployed payloads

Digging deeper and tracing the activity back, we identified the source: a signed executable (RaceCarTwo.exe) from Dragon Boss Solutions LLC running an install command.


Figure 4: Process history for the executable signed by Dragon Boss Solutions LLC

Looking at child executables revealed Setup.msi.


Figure 5: MSI execution to deploy an “update”

Looking at that task creation again, we see that it’s running out of msiexec and running a script called ClockRemoval.ps1.


Figure 6: Payload execution post “Update”


Variations of executables

Notably, the executables and their install paths follow a pseudo-random naming pattern. However, common similarities can be observed. Names are structured as a [Word][Word][Number] combination (e.g., TableBoatThree, WinSupportNine).  World Wide Web was also very commonly observed. 

Next, the file paths were consistent double-encapsulation. The parent folder appends a suffix (Solutions, or Workstation), while a subfolder follows the pattern C:\Program Files (x86)\[Name][Suffix]\[Name]\[Name].exe. This repetition across the majority of samples suggests an automated installer generating both the name and directory structure.


Executable Name

Path

WorldWideWeb.exe

C:\Program Files (x86)\World Wide Solutions\World Wide Web

UniversalUpdater.exe

C:\Program Files (x86)\Web Genius Solutions\Web Genius

ChromsteraUpdater.exe

C:\Program Files (x86)\Chromstera Browser Solutions\Chromstera Browser

ArtificiusUpdater.exe

C:\Program Files (x86)\Artificius Browser Solutions\Artificius Browser

ReadySpaceThree.exe

C:\Program Files (x86)\FutureSpaceThreeSolutions\FutureSpaceThree

WinDefenseThree.exe

C:\Program Files (x86)\WinDefenseThreeSolutions\WinDefenseThree

SistemaTownOne.exe

C:\Program Files (x86)\SistemaTownOneWorkstation\SistemaTownOne

TableBoatTwo.exe

C:\Program Files (x86)\TableBoatTwoWorkstation\TableBoatTwo

RaceCarTwo.exe

C:\Program Files (x86)\RaceCarTwoolutions\RaceCarTwo

WaveTownFive.exe

C:\Program Files (x86)\WaveTownFiveWorkstation\WaveTownFive

WinSupportFive.exe

C:\Program Files (x86)\WinSupportFiveSolutions\WinSupportFive

WinDefenseFive.exe

C:\Program Files (x86)\WinDefenseFiveSolutions\WinDefenseFive

ProductSetupTwo.exe

C:\Program Files (x86)\ProductSetupTwoSolutions\ProductSetupTwo

Table 7: Observed executables at time of investigation

The grandparent process RaceCarTwo.exe (SHA256: 909539d3ef8dedc3be56381256713fa5545cc7fd3d3d0e0428f7efb94a7e71cb) had been present on the affected host since 2024. Windows event logs revealed executions of Setup.msi from C:\\Program Files (x86)\RaceCarTwoolutions\RaceCarTwo\updates\Update\ dating back to October 2025. 

These files are old, so what changed to put this on our radar?



The update mechanism

With the MSI file no longer present on disk (a common challenge when investigating installer-based threats), we turned to a configuration file left behind: RaceCarTwo.ini.

This file revealed that the PUP uses Advanced Installer, an off-the-shelf update mechanism to poll remote servers for installers:


Figure 8: Configuration .ini for the update mechanism

Several configuration flags caught our attention:

Flag

Implication

NoUpdaterInstallGUI

No user interaction required; completely silent

PerMachine

Runs with elevated privileges

CheckFrequency=1

Polls frequently for new payloads

NoDisableAutoCheck

User cannot disable automatic updates

This is where we made a concerning discovery: the first URL domain (worldwidewebframework3[.]com) is unregistered, which piqued our interest. Reviewing the configurations on another host, we identified a second unregistered domain, chromsterabrowser[.]com.

But this time the unregistered domain wasn't a fallback: it was the primary update URL. 

That's a meaningful distinction. With the fallback domain on RaceCarTwo, an attacker would only gain execution capability if the primary domain was unavailable or blocked. With chromsterabrowser[.]com, anyone who registered it would be first in line, no filtering or blocking required. Every host running that variant would reach out to this domain for updates, you’d just need to register the domain and serve a malicious payload.

Back to our original host: the main domain (worldwidewebuniverse3[.]com) was active and the response pointed to a file named Setup.msi hosted at dl.isready26[.]online and masquerading as a GIF image.


Figure 9: Update pointed to https://dl.isready26[.]online/image/ldk4945jfds.gif - VT



Payload analysis

We now have the MSI file (SHA256: 40ac30ce1e88c47f317700cc4b5aa0a510f98c89e11c32265971564930418372), and unzipping it we see it contains several components:


Figure 10: Extracted MSI file contents

Most of these are default files for an Advanced Installer MSI, but a few stand out.

  • Binary.PowerShellScriptLauncher.dll - VT

  • Binary.SoftwareDetector.dll - VT 

  • Binary.AICustAct.dll - VT

  • !_StringData - This includes the instructions/script for the installer to run.

    • SHA256: 26ddd0712a101b27b018658b4072ad56bb4083026c797b0345b2cce43862fc83

!_StringData analysis

Before deploying the main payload, the installer conducts reconnaissance:

  1. Environment detection (SoftwareDetector.dll)

    • Checks admin status (AI_DETECTED_ADMIN_USER)

    • Detects virtual machine (AI_DETECTED_VIRTUAL_MACHINE)

    • Verifies internet connectivity (AI_DETECTED_INTERNET_CONNECTION)

  2. AV product reconnaissance (AI_DetectSoftware)

    • Queries registry for Malwarebytes, Kaspersky, McAfee, and ESET installations

  3. Sets PowerShell execution policy (AI_DATA_SETTER_6)

    • Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope CurrentUser -Force

  4. Executes boot-time WMI script (AI_DATA_SETTER_1WMI)

    • Runs ClockRemoval-WmiBoot.ps1

  5. Executes main AV killer (AI_DATA_SETTER)

    • Runs ClockRemoval.ps1 via PowerShellScriptLauncher.dll

  6. Spawns 6-minute self-termination timer

    • Start-Sleep -Seconds 360 then kills .tmp processes



ClockRemoval.ps1: The AV killer

The malware author (or more likely AI) that wrote this nicely provided a synopsis and comments throughout the script detailing its capabilities:


Figure 11: Synopsis at the start of !_StringData/ClockRemoval.ps1

The script writes itself to two locations for redundancy:

  • %SystemRoot%\System32\config\systemprofile\AppData\Local\WMILoad\ClockRemoval.ps1

  • A user-profile equivalent path (i.e., C:\Users\JohnDoe\AppData\Local\WMILoad\ClockRemoval.ps1)


Targeted security products

The script maintains an explicit kill list targeting specific security vendors and browser installers:


Figure 12: Processes targeted by ClockRemoval.ps1

The browser installers are likely included because legitimate browsers would potentially interfere with the adware's browser hijacking capabilities.


Persistence establishment

The script creates five scheduled tasks running as SYSTEM:

Task Name

Task Type

Purpose

ClockSetupWmiAtBoot

Boot Task

Runs ClockRemoval-WmiBoot.ps1 to ensure WMI subscription is active + 30s tight poll-kill of AV processes

DisableClockServicesFirst

Startup Task 

Registry-only disable of AV services (runs before AV starts)

DisableClockAtStartup

Startup Task 

Full AV removal pass (uninstallers, deep cleanup)

RemoveClockAtLogon

Logon Task

Executes -ScheduledRemovalPass (WMI ensure + kill + removal + hosts block)

RemoveClockPeriodic

Recurring Task - 30 minutes

Executes -ScheduledRemovalPass (continuous monitoring and removal)

For WMI persistence, the script establishes event subscriptions via Initialize-MbSetupWmiKill. 


Figure 13: Portion of function Initialize-MbSetupWmiKill in !_StringData/ClockRemoval.ps1

The Win32_ProcessStartTrace subscription catches renamed installers that would evade simple process name matching, like MBSetup (2).exe.


Boot-time defense neutralization

On every system boot, the script executes Invoke-MbSetupWmiBootEnsure to verify WMI subscriptions are intact, recreating them if they've been removed. It then runs Invoke-MbSetupTightPollKill, a tight polling loop that kills matching processes every 100ms for 20 seconds:


Figure 14: Function Invoke-MbSetupTightPollKill in !_StringData/ClockRemoval.ps1

AV processes get killed before they can fully initialize. WMI events alone may have a brief delay, and this polling loop covers that gap.

Following the kill loop, Do-DisableServicesRegistryOnly disables AV services via registry manipulation and strips all AV-related Run keys to prevent them from launching.

Recurring removal sweeps

At boot, logon, and every 30 minutes, the script executes full removal routines:


Function

Action

Do-FullRemoval

Stops services, kills processes, runs vendor uninstallers silently

Do-KillThenRemoval

Process termination followed by file deletion

Remove-AVCompletely

Deletes installation directories and registry entries

Do-ManualRemovalFallback

Forced deletion when uninstallers fail


Domain blocks to prevent Reinstallation/Updates

The script maintains an embedded JSON database of AV vendor domains to block:

Figure 15:  AV domain list embedded in !_StringData/ClockRemoval.ps1

The Invoke-MbRemovalAvHostsBlock function writes these domains to the host’s file, redirecting them to 0.0.0.0. The block is wrapped in markers for easy management:

Figure 16: Function Invoke-MbRemovalAvHostsBlock in !_StringData/ClockRemoval.ps1

The modified host file would look like:

# BEGIN AV-UPDATE-BLOCK-v1 (ClockRemoval.ps1)

# Managed block: ClockRemoval.ps1 -AvHostsBlockRevert / -AvHostsBlockApply

# Redirect target: 0.0.0.0 (null-route)

0.0.0.0 data.service.malwarebytes.com

0.0.0.0 downloads.malwarebytes.com

0.0.0.0 activation-v2.kaspersky.com

...

# END AV-UPDATE-BLOCK-v1


Windows Defender exclusions

A separate embedded script adds Windows Defender exclusions for directories that will contain the adware's payloads:


Figure 17: Portion of additional script from !_StringData to add Defender exclusions

The script checks if the exclusion paths already exist in Defender's configuration and only adds new ones that aren't duplicates. It also checks if user profile folders actually exist on disk before trying to exclude them. The exclusions it attempts to add are:


Category

Path

Program Files - Google

%ProgramFiles%\Google

Program Files - Google

%ProgramFiles(x86)%\Google

Program Files - Edge

%ProgramFiles%\Microsoft\Edge\Application

Program Files - Edge

%ProgramFiles(x86)%\Microsoft\Edge\Application

User AppData - Google

%LOCALAPPDATA%\Google

User AppData - Edge

%LOCALAPPDATA%\Microsoft\Edge

User AppData - Malware

%LOCALAPPDATA%\DGoogle

User AppData - Malware

%LOCALAPPDATA%\EMicrosoft

User AppData - Malware

%LOCALAPPDATA%\DDapps

ProgramData - PUP

%ProgramData%\Chromnius

ProgramData - PUP

%ProgramData%\ChromniusEdge

DGoogle, EMicrosoft, and DDapps don't correspond to legitimate software. These appear to be staging directories for follow-on payloads, excluded from Defender scanning before they even exist.

Selective cleanup

Once Invoke-MbRemovalPersistenceTeardownIfAvClean confirms AV removal is complete, the script tears down most of its scheduled tasks via Remove-OurScheduledTasks. However, it permanently retains:

  • The boot task

  • WMI event subscriptions

This ensures the endpoint remains "protected" against AV reinstallation indefinitely.

Outcome

Looking at our example host, we see it successfully nuked “ESET Security” with it no longer being present, along with the exclusions that were added.

Figure 18: Installed security products on infected host



The threat actor: Dragon Boss Solutions LLC

According to CrunchBase, Dragon Boss Solutions “engages in research to find the best Search Monetization Solutions for Browser Extensions, Software and Desktop Applications” and is located in Sharjah, United Arab Emirates. 

Figure 19: CrunchBase listing for “Dragon Boss Solutions”

Although their website is currently offline, there are previous scans available that show a different location.

Figure 20: URLScan.io listing for www.dragonboss[.]com/contact/

Historically, their signature has been tracked as adware by AV companies. Detections list DragonBoss and Chromnius, and it is widely categorized as a PUP with browser hijacking functionality.

Looking into Chromnius we can find an old website that they use to distribute their PUP through, although now it redirects to a malware removal guide.

Figure 21: URLScan.io listing for www.chromnius[.]com

Modified Chrome binaries

Searching across our environment, we observed the Dragon Boss Solutions code signing certificate on modified Chrome.exe binaries executing with a notable command-line flag:

"C:\Program Files\Google\Chrome\Application\chrome.exe" --simulate-outdated-no-au="01 Jan 2199"

This flag disables Chrome's auto-update mechanism entirely, locking users into a potentially vulnerable, modified browser version. These binaries have positive detections on VirusTotal.


Figure 22: VT listing for modified Chrome Binary



So what did Huntress do?

That unregistered domain concerned us to say the least. With SYSTEM level code execution possible and AV already disabled on affected hosts, it represented a genuine risk from anyone willing to spend a few dollars on a domain registration.

Our first step was to understand exactly how this update mechanism behaved. We extracted the updater executable and configuration file (ChromsteraUpdater.ini) from an infected host and moved it into a controlled lab environment,with the goal of demonstrating the attack chain and confirming that the unregistered domain was actually being used in the wild.


Lab validation

Setting up the test environment required recreating the infection conditions in a safe environment. We copied the Dragon Boss Solutions binary and its configuration to a Windows VM, modifying the update URLs to strip the TLS requirement as a bare functional proof-of-concept. TLS was later introduced to validate the required signing conditions. All configured domains were intercepted by local DNS resolvers and pointed towards lab tooling.

We recreated the malicious update package by feeding a simple PowerShell payload (in this case, launching calc.exe) into an MSI bundle that would be accepted by the Windows Installer Service. The resulting MSI was renamed to match the expected filename format (ldk4945jfds.gif) and placed in the staging directory. An updates.txt file was crafted to mirror the legitimate Dragon Boss update manifest, pointing to our malicious payload.

Figure 23: Update pointed to https://dl.isready26[.]online/image/ldk4945jfds.gif

To trigger the update, we registered a scheduled task matching the persistence mechanism observed on victim hosts, running ChromsteraUpdater.exe with elevated privileges, as per the conditions on each infected host. When executed, the updater immediately reached out to our controlled server, downloaded the fake "update," and silently installed it without any user interaction. These elevated levels of persistence ensured there would be no UAC or alarms related to the installation of an unsigned MSI package.


Figure 24: Hijacking the update URL in a lab environment 

The test confirmed what we suspected; the update mechanism was fully functional, completely silent, and would execute any payload we provided. If an attacker registered that unregistered domain, they would inherit this exact capability across every infected host.

Notable nuances presented themselves, in that when the C2 channel was TLS protected (HTTPS) the website needed to be signed by a trusted CA; self signing did not work. Furthermore, the size of the distributed MSI needed to match a configured payload. If either of these conditions were overlooked, then the payload would fail to execute and the infected device would present an error to the user.


Real-world confirmation

To verify this wasn't just a lab curiosity, Huntress registered “chromsterabrowser[.]com“ and “worldwidewebframework3[.]com” before anyone else could. We stood up monitoring infrastructure and pointed DNS records to a sinkhole, then watched to see if any infected hosts would reach out.

They did. Immediately.

Over a 24-hour observation period, we captured connection attempts from infected endpoints, all running Dragon Boss Solutions software and reaching out to our newly registered domain. These were real systems in production environments, already compromised, already running with disabled antivirus protection, and now attempting to download whatever we serve them. Fortunately, Huntress found it first, so all these requests are simply getting sinkholed.



Statistics

Over the 24-hour monitoring period, our sinkhole infrastructure captured the following statistics from infected hosts attempting to download updates from the unregistered domain.

Total unique hosts

23,565 unique IP addresses connected to the sinkhole during the 24-hour observation period, representing active infections attempting to communicate with the malicious infrastructure.

Geographic distribution

The infected hosts spanned multiple countries, with infections detected all around the globe:


Figure 25: Heatmap of unique IP address locations

The infected hosts spanned 124 countries across all continents, with the following top regions by infection count:

  • United States - 12,697 hosts (53.9%)

  • France - 2,803 hosts (11.9%)

  • Canada - 2,380 hosts (10.1%)

  • United Kingdom - 2,223 hosts (9.4%)

  • Germany - 2,045 hosts (8.7%)


High-value target analysis

In a particularly concerning finding, based on the IP addresses observed, we identified 324 infections within high-value target networks, including:

  • 221 Universities and Colleges - Academic institutions across North America, Europe, and Asia

  • 41 Operational Technology networks - Electric utilities, power cooperatives, transport networks, and critical infrastructure providers

  • 35 Government entities - Municipal governments, state agencies, and public utilities

  • 24 Primary and secondary educational institutions

  • 3 Healthcare organizations - Hospital systems and healthcare providers

  • Additionally, infections were observed within networks of multiple Fortune 500 companies

These high-value targets represent approximately 1.4% of all observed infections but pose a significantly elevated risk due to the sensitive nature of their operations and data.



Conclusion

What began as an adware alert turned out to be something far more deliberate. Dragon Boss Solutions' browser-hijacking PUP is signed with a legitimate code-signing certificate, hides behind a trusted update mechanism, and silently deploys a sophisticated AV killer. The payload, ClockRemoval.ps1, does not just disable security tools: it blocks their update domains, strips their registry entries, poisons the host’s file, carves out Defender exclusions for future payloads, and ensures persistence on every reboot through WMI event subscriptions and scheduled tasks. This is not adware getting aggressive. It is adware with an evolving playbook, blurring the lines with traditional threats.

The broader concern is that the domain baked into the update configuration was available for the taking before we registered it. Anyone who registered the domain chromsterabrowser[.]com would have gained the ability to push arbitrary payloads to every host running this variant of the software, no exploitation required. The infrastructure was already built and waiting, with AV already disabled at that. 

This is a good lesson in the risks hiding inside PUPs. While PUPs are often dismissed as an annoyance or noise, in this case we treated these detections as a priority incident rather than routine adware cleanup. Go and hunt in your environment for the WMI artifacts and scheduled tasks outlined above, or just anything with a “Dragon Boss Solutions” signature. PUPs have long occupied a grey area in security. This campaign is a reminder that grey can turn dark very quickly.



Detection 

  • Hunt for WMI event subscriptions containing "MbRemoval" or "MbSetup" in the consumer name

  • Monitor for scheduled tasks referencing WMILoad directories or ClockRemoval

  • Alert on processes signed by Dragon Boss Solutions LLC

  • Review Windows “hosts” files for blocks against AV vendor domains

  • Check Defender exclusions for suspicious paths like DGoogle, EMicrosoft, or DDapps


Indicators of Compromise

File hashes (SHA256)

Hash

Description

909539d3ef8dedc3be56381256713fa5545cc7fd3d3d0e0428f7efb94a7e71cb

Initial Loader/Updater

40ac30ce1e88c47f317700cc4b5aa0a510f98c89e11c32265971564930418372

Setup.msi

26ddd0712a101b27b018658b4072ad56bb4083026c797b0345b2cce43862fc83

!_StringData payload

feb13087c43406da7f2cea26b003a9b93db0e6b544b10bd57342d5dbbb18ba02

ClockRemoval.ps1 (Manually reconstructed)

da6aba50f9908f5f29d877dfaaca1ef6e03d597bb7b52bd294b4ec644fe7e6c0

ClockRemoval-WmiBoot.ps1


Network indicators

Domain

Status

worldwidewebuniverse3[.]com

C2 - Active

worldwidewebframework3[.]com

C2 - Sinkholed

worldwidewebframework2[.]com

C2 - Active

artificialupdates[.]com

C2 - Active

dragonstraffic[.]com

C2 - Active

updaterituals[.]com

C2 - Active

chromsterabrowser[.]com

C2 - Sinkholed

chromsteraupdates[.]com

C2 - Active

isready26[.]online

Payload


File system artifacts

Path

Description

C:\Program Files (x86)\World Wide Solutions\World Wide Web\

Installation directory

C:\Program Files (x86)\World Wide Solutions\World Wide Debug\

Installation directory

C:\Program Files (x86)\WinSupportSixSolutions\WinSupportSix\

Installation directory

C:\Program Files (x86)\WinSupportFiveSolutions\WinSupportFive\

Installation directory

C:\Program Files (x86)\WinSupportNineSolutions\WinSupportNine\

Installation directory

C:\Program Files (x86)\WaveTownFiveWorkstation\WaveTownFive\

Installation directory

C:\Program Files (x86)\FutureSpaceThreeSolutions\FutureSpaceThree\

Installation directory

C:\Program Files (x86)\Web Genius Solutions\Web Genius\

Installation directory

C:\Program Files (x86)\TableBoatNineWorkstation\TableBoatNine\

Installation directory

C:\Program Files (x86)\TableBoatTwoWorkstation\TableBoatTwo\

Installation directory

C:\Program Files (x86)\TableBoatThreeWorkstation\TableBoatThree\

Installation directory

C:\Program Files (x86)\SistemaTownOneWorkstation\SistemaTownOne\

Installation directory

C:\Program Files (x86)\SistemaTownThreeWorkstation\SistemaTownThree\

Installation directory

C:\Program Files (x86)\RaceCarTwoolutions\RaceCarTwo\

Installation directory

C:\Program Files (x86)\ProductSetupTwoSolutions\ProductSetupTwo\

Installation directory

C:\Program Files (x86)\WinDefenseThreeSolutions\WinDefenseThree\

Installation directory

C:\Program Files (x86)\WinDefenseFiveSolutions\WinDefenseFive\

Installation directory

C:\Program Files (x86)\Chromstera Browser\

Installation directory

C:\Program Files (x86)\Local World Solutions12\Local World Service12\

Installation directory

C:\Program Files (x86)\Local Net Solutions17\Local Net Service17\

Installation directory

C:\Program Files (x86)\Local Net Solutions19\Local Net Service19\

Installation directory

C:\Program Files (x86)\LocalNetSolutionsEight40\LocalNetServiceEight40\

Installation directory

C:\Program Files (x86)\GeneralAISupport1Solutions\GeneralAISupport1\

Installation directory

C:\ProgramData\World Wide Solutions\World Wide Web\updates\

Update staging directory

%SystemRoot%\System32\config\systemprofile\AppData\Local\WMILoad\

Payload location


Code signing

Attribute

Value

Subject Name

Dragon Boss Solutions LLC


WMI artifacts

Subscription Name

Type

MbRemovalMbSetupKillConsumer

Event Consumer

MbRemovalMbSetupKillConsumerTrace

Event Consumer


Scheduled tasks

Task Name

Type

ClockSetupWmiAtBoot

Boot Task

DisableClockServicesFirst

Startup Task 

DisableClockAtStartup

Startup Task 

RemoveClockAtLogon

Logon Task

RemoveClockPeriodic

Recurring Task - 30 minutes


Defender exclusion paths

Path

%LOCALAPPDATA%\DGoogle

%LOCALAPPDATA%\EMicrosoft

%LOCALAPPDATA%\DDapps

%ProgramData%\Chromnius

%ProgramData%\ChromniusEdge





Categories
Threat Analysis
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Active Exploitation of SolarWinds Web Help Desk

    Huntress has observed active exploitation of a deserialization and remote code execution against the SolarWinds Web Help Desk software (CVE-2025-26399).
  • Cybersecurity Education Is the Key to Outsmarting Hackers

    In cybersecurity, education and training are the key to winning. Read our blog to learn how you can grow your skills through continuous security education.
  • Analyzing Initial Access Across Today's Business Environment

    Learn more about the initial access techniques observed by the Huntress SOC and Tactical Response teams! Gain valuable insights to help you protect your environment.
  • Understanding Your SMB Clients' Cybersecurity Needs

    SMBs need more advanced cybersecurity. Learn about the tools you need to help guide your clients toward better threat detection and response.
  • Phishing, Office 365 and the Commercialization of Cybercrime

    Hackers getting better at their tradecraft and their skills are becoming more and more accessible to other bad actors via the Dark Web.
  • Detection Guidance for ConnectWise CVE-2024-1709

    Stay secure with Huntress! Learn about critical vulnerabilities tied to ConnectWise, including CWE-288 authentication bypass. Patch now to version 23.9.8 for protection.
  • A Sneak Peek at hack_it 2022

    Our workshop dedicated to hacker tradecraft is back November 14-16. Mark your calendars, sign up today and don't forget your hacker hat!
  • Why Having Backups Isn't Enough

    Having backups is only one component of a solid business continuity and disaster recovery plan.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy