Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
ﱞﱞﱞ�...ﱞﱞ
windows7_x64
ﱞﱞﱞ�...ﱞﱞ
windows7_x64
ﱞﱞﱞ�...ﱞﱞ
windows7_x64
10ﱞﱞﱞ�...ﱞﱞ
windows7_x64
10win102
windows10_x64
10win102
windows10_x64
8win102
windows10_x64
8win102
windows10_x64
8win104
windows10_x64
10win104
windows10_x64
10win104
windows10_x64
8win104
windows10_x64
8win105
windows10_x64
8win105
windows10_x64
8win105
windows10_x64
8win105
windows10_x64
10win106
windows10_x64
10win106
windows10_x64
10win106
windows10_x64
10win106
windows10_x64
10win103
windows10_x64
10win103
windows10_x64
8win103
windows10_x64
8win103
windows10_x64
10win101
windows10_x64
10win101
windows10_x64
8win101
windows10_x64
10win101
windows10_x64
8win100
windows10_x64
10win100
windows10_x64
10win100
windows10_x64
8win100
windows10_x64
10Resubmissions
12/11/2024, 01:29
241112-bwgrxs1gnf 1008/07/2021, 12:18
210708-8z6d5h8z2n 1006/07/2021, 17:53
210706-g6we6sa7sa 1019/06/2021, 18:17
210619-vr8bj2dzfn 1017/06/2021, 21:39
210617-a9cvlnmrbx 1011/06/2021, 17:26
210611-wvab1yw2tj 1008/06/2021, 06:47
210608-qrbpch3y46 1008/06/2021, 06:47
210608-64tndgm1ln 1005/06/2021, 18:40
210605-cd6qpr55sx 1004/06/2021, 11:56
210604-5c416rs3ns 10Analysis
-
max time kernel
1786s -
max time network
1801s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18/05/2021, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Install2.exe
Resource
win7v20210410
Behavioral task
behavioral3
Sample
keygen-step-4.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
keygen-step-4d.exe
Resource
win7v20210410
Behavioral task
behavioral5
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral6
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral8
Sample
keygen-step-4d.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Install2.exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
keygen-step-4d.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
Install.exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
keygen-step-4d.exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral18
Sample
Install2.exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
keygen-step-4.exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
keygen-step-4d.exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral24
Sample
keygen-step-4d.exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
keygen-step-4.exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
keygen-step-4d.exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral30
Sample
Install2.exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
keygen-step-4.exe
Resource
win10v20210410
General
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 8092 created 5088 8092 svchost.exe 164 PID 8092 created 4544 8092 svchost.exe 337 PID 8092 created 7256 8092 svchost.exe 344 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 63 IoCs
flow pid Process 142 5492 MsiExec.exe 143 5492 MsiExec.exe 144 5492 MsiExec.exe 145 5492 MsiExec.exe 147 5492 MsiExec.exe 148 5492 MsiExec.exe 149 5492 MsiExec.exe 150 5492 MsiExec.exe 152 5492 MsiExec.exe 153 5492 MsiExec.exe 154 5492 MsiExec.exe 156 5492 MsiExec.exe 157 5492 MsiExec.exe 158 5492 MsiExec.exe 161 5492 MsiExec.exe 163 5492 MsiExec.exe 164 5492 MsiExec.exe 165 5492 MsiExec.exe 167 5492 MsiExec.exe 169 5492 MsiExec.exe 170 5492 MsiExec.exe 172 5492 MsiExec.exe 173 5492 MsiExec.exe 174 5492 MsiExec.exe 175 5492 MsiExec.exe 176 5492 MsiExec.exe 177 5492 MsiExec.exe 178 5492 MsiExec.exe 179 5492 MsiExec.exe 180 5492 MsiExec.exe 181 5492 MsiExec.exe 182 5492 MsiExec.exe 183 5492 MsiExec.exe 184 5492 MsiExec.exe 185 5492 MsiExec.exe 186 5492 MsiExec.exe 187 5492 MsiExec.exe 188 5492 MsiExec.exe 189 5492 MsiExec.exe 193 5492 MsiExec.exe 194 5492 MsiExec.exe 196 5492 MsiExec.exe 197 5492 MsiExec.exe 198 5492 MsiExec.exe 199 5492 MsiExec.exe 200 5492 MsiExec.exe 202 5492 MsiExec.exe 203 5492 MsiExec.exe 303 4432 MsiExec.exe 313 4432 MsiExec.exe 316 4432 MsiExec.exe 323 4432 MsiExec.exe 432 6980 cmd.exe 431 6980 cmd.exe 438 6980 cmd.exe 439 6980 cmd.exe 442 6980 cmd.exe 443 6980 cmd.exe 447 6980 cmd.exe 533 2896 MsiExec.exe 534 2896 MsiExec.exe 535 2896 MsiExec.exe 536 2896 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Ultra.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 3316505.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 4_177039.exe -
Executes dropped EXE 64 IoCs
pid Process 2388 xiuhuali.exe 3456 JoSetp.exe 4364 Install.exe 4396 Install.tmp 4512 Ultra.exe 4728 ultramediaburner.exe 4760 ultramediaburner.tmp 4848 UltraMediaBurner.exe 4840 Cofytaepaecy.exe 4956 Bedavishala.exe 5052 filee.exe 4572 001.exe 4816 setup.exe 1904 jg6_6asg.exe 4540 hbggg.exe 4520 jfiag3g_gg.exe 5840 cmd.exe 6096 cmd.exe 5680 setup.exe 5056 customer1.exe 6080 toolspab1.exe 5808 jfiag3g_gg.exe 5348 cmd.exe 1032 jfiag3g_gg.exe 5676 gaoou.exe 3836 explorer.exe 5652 jfiag3g_gg.exe 5716 cmd.exe 1452 timeout.exe 4644 702564a0.exe 4108 2D4A.exe 5088 app.exe 5660 Setup3310.exe 4368 Setup3310.tmp 5708 423B.exe 6016 46EF.exe 5256 Setup.exe 5412 hjjgaa.exe 5452 svchost.exe 5304 BarSetpFile.exe 5692 guihuali-game.exe 5720 Conhost.exe 5824 lylal220.exe 5440 jg7_7wjg.exe 6020 askinstall38.exe 1296 Conhost.exe 5644 LabPicV3.tmp 4872 4_177039.exe 5200 3316505.exe 2624 jfiag3g_gg.exe 2200 4101025.exe 3836 explorer.exe 4224 Windows Host.exe 5728 8428532.exe 4648 4276172.exe 5608 prolab.exe 4380 prolab.tmp 4384 irecord.exe 5396 Begishishaelo.exe 4924 irecord.tmp 2768 Laewidifepe.exe 1388 Fuparedope.exe 5068 Vagishavata.exe 5740 i-record.exe -
resource yara_rule behavioral16/files/0x000400000001a50b-268.dat upx behavioral16/files/0x000400000001a50b-269.dat upx behavioral16/files/0x000100000001ac2d-326.dat upx behavioral16/files/0x000100000001ac2d-324.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8428532.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8428532.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Begishishaelo.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Cofytaepaecy.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation guihuali-game.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation google-game.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Laewidifepe.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation keygen-step-4d.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation google-game.exe -
Loads dropped DLL 64 IoCs
pid Process 1904 rundll32.exe 4396 Install.tmp 4816 setup.exe 4816 setup.exe 4816 setup.exe 5356 MsiExec.exe 5356 MsiExec.exe 6088 rUNdlL32.eXe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 5492 MsiExec.exe 4816 setup.exe 5492 MsiExec.exe 5492 MsiExec.exe 5348 cmd.exe 5252 MsiExec.exe 5252 MsiExec.exe 5252 MsiExec.exe 5252 MsiExec.exe 5252 MsiExec.exe 5252 MsiExec.exe 5252 MsiExec.exe 5492 MsiExec.exe 1452 timeout.exe 1452 timeout.exe 1452 timeout.exe 6100 MsiExec.exe 6100 MsiExec.exe 4432 MsiExec.exe 4432 MsiExec.exe 4432 MsiExec.exe 4644 702564a0.exe 4432 MsiExec.exe 4432 MsiExec.exe 4368 Setup3310.tmp 4368 Setup3310.tmp 4432 MsiExec.exe 4432 MsiExec.exe 4432 MsiExec.exe 4432 MsiExec.exe 4432 MsiExec.exe 1452 timeout.exe 4432 MsiExec.exe 4432 MsiExec.exe 5644 LabPicV3.tmp 1296 Conhost.exe 6036 cmd.exe 5072 MsiExec.exe 5072 MsiExec.exe 5072 MsiExec.exe 5072 MsiExec.exe 5072 MsiExec.exe 5072 MsiExec.exe 5072 MsiExec.exe 4432 MsiExec.exe 5452 svchost.exe 5452 svchost.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gaoou.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Data Finder\\Gaepyfivaeje.exe\"" 3316505.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Papofegeja.exe\"" 4_177039.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host Service = "C:\\Windows\\System\\svchost.exe" EB5E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Microsoft.NET\\Jinajusaemi.exe\"" Ultra.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg6_6asg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8428532.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg7_7wjg.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\H: setup.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: timeout.exe File opened (read-only) \??\T: timeout.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\V: setup.exe File opened (read-only) \??\L: timeout.exe File opened (read-only) \??\M: timeout.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: timeout.exe File opened (read-only) \??\J: setup.exe File opened (read-only) \??\P: setup.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: timeout.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\S: setup.exe File opened (read-only) \??\W: setup.exe File opened (read-only) \??\I: timeout.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: timeout.exe File opened (read-only) \??\V: timeout.exe File opened (read-only) \??\X: timeout.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\I: setup.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\A: timeout.exe File opened (read-only) \??\Q: timeout.exe File opened (read-only) \??\S: timeout.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\G: setup.exe File opened (read-only) \??\U: setup.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: timeout.exe File opened (read-only) \??\N: timeout.exe File opened (read-only) \??\W: timeout.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\B: setup.exe File opened (read-only) \??\N: setup.exe File opened (read-only) \??\E: timeout.exe File opened (read-only) \??\Q: setup.exe File opened (read-only) \??\J: timeout.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: timeout.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: timeout.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\F: setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 64 ip-api.com 247 ipinfo.io 249 ipinfo.io 361 ip-api.com 525 ipinfo.io 538 ipinfo.io -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 7361417E7DA430EC svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 1A5477D793493D0C svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5728 8428532.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1236 set thread context of 2160 1236 svchost.exe 80 PID 1236 set thread context of 4668 1236 svchost.exe 86 PID 6080 set thread context of 5348 6080 toolspab1.exe 166 PID 6604 set thread context of 6620 6604 F050.exe 247 PID 7064 set thread context of 2764 7064 toolspab1.exe 299 PID 4376 set thread context of 6280 4376 jfiag3g_gg.exe 301 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\UltraMediaBurner\is-2I1CA.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe Setup.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe Setup.exe File created C:\Program Files\7-Zip\TOCVTUHSBI\prolab.exe 3316505.exe File created C:\Program Files (x86)\Picture Lab\is-7KHTB.tmp prolab.tmp File opened for modification C:\Program Files (x86)\recording\AForge.Video.FFMPEG.dll irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe Setup.exe File opened for modification C:\Program Files (x86)\Picture Lab\SourceLibrary.dll prolab.tmp File created C:\Program Files (x86)\Data Finder\Gaepyfivaeje.exe 3316505.exe File created C:\Program Files (x86)\Picture Lab\is-6BHK8.tmp prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-JD375.tmp prolab.tmp File opened for modification C:\Program Files (x86)\recording\avutil-51.dll irecord.tmp File created C:\Program Files (x86)\recording\is-7NKO0.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-C6BGI.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-K0FVA.tmp irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\Microsoft.NET\Jinajusaemi.exe Ultra.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File opened for modification C:\Program Files (x86)\Picture Lab\WeifenLuo.WinFormsUI.dll prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-997D5.tmp prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-QMAJ3.tmp prolab.tmp File opened for modification C:\Program Files (x86)\recording\avcodec-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\d.jfm jg7_7wjg.exe File created C:\Program Files\Microsoft Office\NGQQELWCEJ\ultramediaburner.exe Ultra.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe Setup.exe File created C:\Program Files (x86)\Data Finder\Gaepyfivaeje.exe.config 3316505.exe File created C:\Program Files (x86)\Picture Lab\is-H5N7T.tmp prolab.tmp File created C:\Program Files (x86)\recording\is-NGMI9.tmp irecord.tmp File created C:\Program Files (x86)\Data Finder\Versium Research\d.jfm jg7_7wjg.exe File created C:\Program Files (x86)\Picture Lab\is-1MNFG.tmp prolab.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\Picture Lab\is-EN53L.tmp prolab.tmp File created C:\Program Files (x86)\recording\is-GAKPP.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-SB88Q.tmp irecord.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\askinstall38.exe Setup.exe File opened for modification C:\Program Files (x86)\Picture Lab\DockingToolbar.dll prolab.tmp File created C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File opened for modification C:\Program Files (x86)\recording\avdevice-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.exe irecord.tmp File opened for modification C:\Program Files (x86)\Picture Lab\AForge.Imaging.dll prolab.tmp File created C:\Program Files (x86)\Windows Defender\Papofegeja.exe 4_177039.exe File opened for modification C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File opened for modification C:\Program Files (x86)\recording\swresample-0.dll irecord.tmp File created C:\Program Files\7-Zip\TOCVTUHSBI\prolab.exe.config 3316505.exe File opened for modification C:\Program Files (x86)\Picture Lab\Pictures Lab.exe prolab.tmp File opened for modification C:\Program Files (x86)\recording\avformat-53.dll irecord.tmp File created C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\recording\is-2GHFC.tmp irecord.tmp File created C:\Program Files\Microsoft Office\NGQQELWCEJ\ultramediaburner.exe.config Ultra.exe File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\Uninstall.exe Setup.exe File created C:\Program Files (x86)\Data Finder\Versium Research\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\recording\Bunifu_UI_v1.52.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\Data Finder\Versium Research\d jg7_7wjg.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\d.INTEG.RAW jg7_7wjg.exe File created C:\Program Files (x86)\Data Finder\Versium Research\tmp.edb jg7_7wjg.exe File created C:\Program Files\install.dll xiuhuali.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File opened for modification C:\Program Files (x86)\Picture Lab\AForge.Math.dll prolab.tmp File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI8161.tmp msiexec.exe File opened for modification C:\Windows\System\libcrypto-1_1.dll svchost.exe File opened for modification C:\Windows\Installer\MSI309A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI32DE.tmp msiexec.exe File opened for modification C:\Windows\Installer\f74670c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3F59.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI69FB.tmp msiexec.exe File created C:\Windows\Installer\f74670f.msi msiexec.exe File created C:\Windows\System\svchost.exe EB5E.exe File opened for modification C:\Windows\Installer\MSI8F5B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI928A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI976E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6BFE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8184.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E4C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI50E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8A9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3851.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI3D44.tmp msiexec.exe File opened for modification C:\Windows\System\spoolsv.tar svchost.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI44F9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4BE2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI716F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7FD9.tmp msiexec.exe File opened for modification C:\Windows\System\libssl-1_1.dll svchost.exe File opened for modification C:\Windows\Installer\MSI748F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7E84.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3522.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI93D3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI99B1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D4D.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\MSI44AA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI743E.tmp msiexec.exe File opened for modification C:\Windows\System\libwinpthread-1.dll svchost.exe File opened for modification C:\Windows\Installer\MSI48E3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1210.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI33EA.tmp msiexec.exe File opened for modification C:\Windows\System\libevent_core-2-1-7.dll svchost.exe File opened for modification C:\Windows\System\libevent_extra-2-1-7.dll svchost.exe File opened for modification C:\Windows\System\spoolsv.exe svchost.exe File opened for modification C:\Windows\Installer\MSI8426.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E1C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8F19.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI715E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI78A4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9121.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3B3E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8421.tmp msiexec.exe File created C:\Windows\System\xxx1.bak EB5E.exe File opened for modification C:\Windows\System\libgcc_s_sjlj-1.dll svchost.exe File opened for modification C:\Windows\Installer\MSI1E68.tmp msiexec.exe File created C:\Windows\Installer\f74670c.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9297.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI335C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI756A.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI39E6.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 6148 1992 WerFault.exe 300 8756 8544 WerFault.exe 360 9908 4648 WerFault.exe 197 -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cmd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cmd.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1452 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found -
Kills process with taskkill 5 IoCs
pid Process 3724 taskkill.exe 5700 taskkill.exe 1400 taskkill.exe 5784 taskkill.exe 3612 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main EB5E.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates grtjeju Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust grtjeju Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates app.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\18\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates app.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates grtjeju Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs grtjeju Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" app.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed grtjeju Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates grtjeju Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates grtjeju Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust app.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" app.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 1f5907ace64bd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance google-game.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 8711c95ae64bd701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix cmd.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate cmd.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionIn = "{6D2692A8-1994-4D7C-8C18-D8AAC37687A3}" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 03de135ae64bd701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = 010000001dec43946d8e691267a3027e46700924f5e5ae66f1f000f3f28bf339ee8651a70432c646b65c2c67b5585da9b691a0b32ca1e5e3fb90e024fe3a7460c1d5 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{WW6060MI-ED3Y-MI7M-57W2-EJZ5M77G1X0K} svchost.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164C = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompletedV = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 filee.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 filee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 6456 PING.EXE 2592 PING.EXE 1444 PING.EXE 5008 PING.EXE -
Script User-Agent 22 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 270 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 551 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 559 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 260 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 539 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 540 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 555 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 557 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 564 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 258 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 251 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 262 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 542 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 543 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 554 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 556 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 560 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 249 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 561 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 268 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 562 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 248 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1904 rundll32.exe 1904 rundll32.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 4760 ultramediaburner.tmp 4760 ultramediaburner.tmp 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe 4956 Bedavishala.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2376 Process not Found -
Suspicious behavior: MapViewOfSection 60 IoCs
pid Process 3792 explorer.exe 3792 explorer.exe 3792 explorer.exe 5348 cmd.exe 4644 702564a0.exe 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 7164 explorer.exe 7164 explorer.exe 3836 explorer.exe 3836 explorer.exe 2376 Process not Found 2376 Process not Found 6632 explorer.exe 6632 explorer.exe 2376 Process not Found 2376 Process not Found 6632 explorer.exe 6632 explorer.exe 7164 explorer.exe 7164 explorer.exe 3836 explorer.exe 3836 explorer.exe 7112 MicrosoftEdgeCP.exe 7112 MicrosoftEdgeCP.exe 6632 explorer.exe 6632 explorer.exe 7164 explorer.exe 7164 explorer.exe 3836 explorer.exe 3836 explorer.exe 2764 toolspab1.exe 5380 702564a0.exe 6680 702564a0.exe 3836 explorer.exe 3836 explorer.exe 7164 explorer.exe 7164 explorer.exe 6632 explorer.exe 6632 explorer.exe 7164 explorer.exe 7164 explorer.exe 6632 explorer.exe 6632 explorer.exe 3836 explorer.exe 3836 explorer.exe 8340 MicrosoftEdgeCP.exe 8340 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeTcbPrivilege 1236 svchost.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 3456 JoSetp.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 1904 rundll32.exe Token: SeDebugPrivilege 4512 Ultra.exe Token: SeTcbPrivilege 1236 svchost.exe Token: SeAuditPrivilege 2348 svchost.exe Token: SeDebugPrivilege 4956 Bedavishala.exe Token: SeDebugPrivilege 4840 Cofytaepaecy.exe Token: SeAssignPrimaryTokenPrivilege 2652 svchost.exe Token: SeIncreaseQuotaPrivilege 2652 svchost.exe Token: SeSecurityPrivilege 2652 svchost.exe Token: SeTakeOwnershipPrivilege 2652 svchost.exe Token: SeLoadDriverPrivilege 2652 svchost.exe Token: SeSystemtimePrivilege 2652 svchost.exe Token: SeBackupPrivilege 2652 svchost.exe Token: SeRestorePrivilege 2652 svchost.exe Token: SeShutdownPrivilege 2652 svchost.exe Token: SeSystemEnvironmentPrivilege 2652 svchost.exe Token: SeUndockPrivilege 2652 svchost.exe Token: SeManageVolumePrivilege 2652 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2652 svchost.exe Token: SeIncreaseQuotaPrivilege 2652 svchost.exe Token: SeSecurityPrivilege 2652 svchost.exe Token: SeTakeOwnershipPrivilege 2652 svchost.exe Token: SeLoadDriverPrivilege 2652 svchost.exe Token: SeSystemtimePrivilege 2652 svchost.exe Token: SeBackupPrivilege 2652 svchost.exe Token: SeRestorePrivilege 2652 svchost.exe Token: SeShutdownPrivilege 2652 svchost.exe Token: SeSystemEnvironmentPrivilege 2652 svchost.exe Token: SeUndockPrivilege 2652 svchost.exe Token: SeManageVolumePrivilege 2652 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2652 svchost.exe Token: SeIncreaseQuotaPrivilege 2652 svchost.exe Token: SeSecurityPrivilege 2652 svchost.exe Token: SeTakeOwnershipPrivilege 2652 svchost.exe Token: SeLoadDriverPrivilege 2652 svchost.exe Token: SeSystemtimePrivilege 2652 svchost.exe Token: SeBackupPrivilege 2652 svchost.exe Token: SeRestorePrivilege 2652 svchost.exe Token: SeShutdownPrivilege 2652 svchost.exe Token: SeSystemEnvironmentPrivilege 2652 svchost.exe Token: SeUndockPrivilege 2652 svchost.exe Token: SeManageVolumePrivilege 2652 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2652 svchost.exe Token: SeIncreaseQuotaPrivilege 2652 svchost.exe Token: SeSecurityPrivilege 2652 svchost.exe Token: SeTakeOwnershipPrivilege 2652 svchost.exe Token: SeLoadDriverPrivilege 2652 svchost.exe Token: SeSystemtimePrivilege 2652 svchost.exe Token: SeBackupPrivilege 2652 svchost.exe Token: SeRestorePrivilege 2652 svchost.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 4760 ultramediaburner.tmp 4816 setup.exe 1452 timeout.exe 4368 Setup3310.tmp 2376 Process not Found 2376 Process not Found 4380 prolab.tmp 4924 irecord.tmp 5444 installer.exe 7416 Setup3310.tmp 7528 Setup3310.tmp -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2388 xiuhuali.exe 2388 xiuhuali.exe 1180 MicrosoftEdge.exe 3792 explorer.exe 3792 explorer.exe 4108 2D4A.exe 5532 MicrosoftEdge.exe 7112 MicrosoftEdgeCP.exe 7112 MicrosoftEdgeCP.exe 5176 MicrosoftEdge.exe 8340 MicrosoftEdgeCP.exe 8340 MicrosoftEdgeCP.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2376 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2388 1696 keygen-step-4d.exe 76 PID 1696 wrote to memory of 2388 1696 keygen-step-4d.exe 76 PID 1696 wrote to memory of 2388 1696 keygen-step-4d.exe 76 PID 2388 wrote to memory of 1904 2388 xiuhuali.exe 78 PID 2388 wrote to memory of 1904 2388 xiuhuali.exe 78 PID 2388 wrote to memory of 1904 2388 xiuhuali.exe 78 PID 1696 wrote to memory of 3456 1696 keygen-step-4d.exe 79 PID 1696 wrote to memory of 3456 1696 keygen-step-4d.exe 79 PID 1904 wrote to memory of 1236 1904 rundll32.exe 71 PID 1904 wrote to memory of 2572 1904 rundll32.exe 34 PID 1236 wrote to memory of 2160 1236 svchost.exe 80 PID 1236 wrote to memory of 2160 1236 svchost.exe 80 PID 1236 wrote to memory of 2160 1236 svchost.exe 80 PID 1904 wrote to memory of 996 1904 rundll32.exe 9 PID 1904 wrote to memory of 2328 1904 rundll32.exe 28 PID 1904 wrote to memory of 2348 1904 rundll32.exe 31 PID 1904 wrote to memory of 1100 1904 rundll32.exe 13 PID 1904 wrote to memory of 380 1904 rundll32.exe 56 PID 1904 wrote to memory of 1416 1904 rundll32.exe 21 PID 1904 wrote to memory of 1976 1904 rundll32.exe 35 PID 1904 wrote to memory of 1148 1904 rundll32.exe 14 PID 1904 wrote to memory of 1368 1904 rundll32.exe 22 PID 1904 wrote to memory of 2652 1904 rundll32.exe 43 PID 1904 wrote to memory of 2660 1904 rundll32.exe 36 PID 1696 wrote to memory of 4364 1696 keygen-step-4d.exe 81 PID 1696 wrote to memory of 4364 1696 keygen-step-4d.exe 81 PID 1696 wrote to memory of 4364 1696 keygen-step-4d.exe 81 PID 4364 wrote to memory of 4396 4364 Install.exe 82 PID 4364 wrote to memory of 4396 4364 Install.exe 82 PID 4364 wrote to memory of 4396 4364 Install.exe 82 PID 4396 wrote to memory of 4512 4396 Install.tmp 83 PID 4396 wrote to memory of 4512 4396 Install.tmp 83 PID 1236 wrote to memory of 4668 1236 svchost.exe 86 PID 1236 wrote to memory of 4668 1236 svchost.exe 86 PID 1236 wrote to memory of 4668 1236 svchost.exe 86 PID 4512 wrote to memory of 4728 4512 Ultra.exe 87 PID 4512 wrote to memory of 4728 4512 Ultra.exe 87 PID 4512 wrote to memory of 4728 4512 Ultra.exe 87 PID 4728 wrote to memory of 4760 4728 ultramediaburner.exe 88 PID 4728 wrote to memory of 4760 4728 ultramediaburner.exe 88 PID 4728 wrote to memory of 4760 4728 ultramediaburner.exe 88 PID 4760 wrote to memory of 4848 4760 ultramediaburner.tmp 90 PID 4760 wrote to memory of 4848 4760 ultramediaburner.tmp 90 PID 4512 wrote to memory of 4840 4512 Ultra.exe 91 PID 4512 wrote to memory of 4840 4512 Ultra.exe 91 PID 4512 wrote to memory of 4956 4512 Ultra.exe 92 PID 4512 wrote to memory of 4956 4512 Ultra.exe 92 PID 1696 wrote to memory of 5052 1696 keygen-step-4d.exe 93 PID 1696 wrote to memory of 5052 1696 keygen-step-4d.exe 93 PID 1696 wrote to memory of 5052 1696 keygen-step-4d.exe 93 PID 4956 wrote to memory of 2604 4956 Bedavishala.exe 96 PID 4956 wrote to memory of 2604 4956 Bedavishala.exe 96 PID 2604 wrote to memory of 4572 2604 cmd.exe 100 PID 2604 wrote to memory of 4572 2604 cmd.exe 100 PID 2604 wrote to memory of 4572 2604 cmd.exe 100 PID 5052 wrote to memory of 4488 5052 filee.exe 101 PID 5052 wrote to memory of 4488 5052 filee.exe 101 PID 5052 wrote to memory of 4488 5052 filee.exe 101 PID 4488 wrote to memory of 1444 4488 cmd.exe 103 PID 4488 wrote to memory of 1444 4488 cmd.exe 103 PID 4488 wrote to memory of 1444 4488 cmd.exe 103 PID 4956 wrote to memory of 4476 4956 Bedavishala.exe 104 PID 4956 wrote to memory of 4476 4956 Bedavishala.exe 104 PID 4476 wrote to memory of 4816 4476 cmd.exe 255
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:996
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1100
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1148
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1416
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1368
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2328
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2572
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1976
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2660
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:380 -
C:\Users\Admin\AppData\Roaming\eftjejuC:\Users\Admin\AppData\Roaming\eftjeju2⤵PID:8328
-
-
C:\Users\Admin\AppData\Roaming\grtjejuC:\Users\Admin\AppData\Roaming\grtjeju2⤵
- Modifies data under HKEY_USERS
PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4d.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiuhuali.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiuhuali.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\JoSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\JoSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\is-1SSET.tmp\Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-1SSET.tmp\Install.tmp" /SL5="$90144,235791,152064,C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\is-NTFKF.tmp\Ultra.exe"C:\Users\Admin\AppData\Local\Temp\is-NTFKF.tmp\Ultra.exe" /S /UID=burnerch14⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files\Microsoft Office\NGQQELWCEJ\ultramediaburner.exe"C:\Program Files\Microsoft Office\NGQQELWCEJ\ultramediaburner.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\is-UATV2.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-UATV2.tmp\ultramediaburner.tmp" /SL5="$300C8,281924,62464,C:\Program Files\Microsoft Office\NGQQELWCEJ\ultramediaburner.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu7⤵
- Executes dropped EXE
PID:4848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f2-31be2-e40-0ff83-cd07b6580252a\Cofytaepaecy.exe"C:\Users\Admin\AppData\Local\Temp\f2-31be2-e40-0ff83-cd07b6580252a\Cofytaepaecy.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\34-716ee-d50-f0e85-ec4fdcd814f01\Bedavishala.exe"C:\Users\Admin\AppData\Local\Temp\34-716ee-d50-f0e85-ec4fdcd814f01\Bedavishala.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mih4wwui.pjf\001.exe & exit6⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\mih4wwui.pjf\001.exeC:\Users\Admin\AppData\Local\Temp\mih4wwui.pjf\001.exe7⤵
- Executes dropped EXE
PID:4572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xxbd5z5e.3zk\installer.exe /qn CAMPAIGN="654" & exit6⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\xxbd5z5e.3zk\installer.exeC:\Users\Admin\AppData\Local\Temp\xxbd5z5e.3zk\installer.exe /qn CAMPAIGN="654"7⤵PID:4816
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\xxbd5z5e.3zk\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\xxbd5z5e.3zk\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1621083795 /qn CAMPAIGN=""654"" " CAMPAIGN="654"8⤵PID:5088
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kkze2e0l.mpl\hbggg.exe & exit6⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\kkze2e0l.mpl\hbggg.exeC:\Users\Admin\AppData\Local\Temp\kkze2e0l.mpl\hbggg.exe7⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:6096
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5d01ip2u.fif\google-game.exe & exit6⤵PID:5600
-
C:\Users\Admin\AppData\Local\Temp\5d01ip2u.fif\google-game.exeC:\Users\Admin\AppData\Local\Temp\5d01ip2u.fif\google-game.exe7⤵PID:5840
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser8⤵
- Loads dropped DLL
PID:6088
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ob25xt4r.g4j\setup.exe & exit6⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\ob25xt4r.g4j\setup.exeC:\Users\Admin\AppData\Local\Temp\ob25xt4r.g4j\setup.exe7⤵
- Executes dropped EXE
PID:5680 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\ob25xt4r.g4j\setup.exe"8⤵PID:4628
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30009⤵
- Runs ping.exe
PID:5008
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0ckq35cf.4bs\customer1.exe & exit6⤵
- Executes dropped EXE
PID:6096 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5600
-
-
C:\Users\Admin\AppData\Local\Temp\0ckq35cf.4bs\customer1.exeC:\Users\Admin\AppData\Local\Temp\0ckq35cf.4bs\customer1.exe7⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5808
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:1032
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kitx4ef1.05l\toolspab1.exe & exit6⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\kitx4ef1.05l\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\kitx4ef1.05l\toolspab1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6080 -
C:\Users\Admin\AppData\Local\Temp\kitx4ef1.05l\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\kitx4ef1.05l\toolspab1.exe8⤵PID:5348
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p1r3ncqw.c0l\GcleanerWW.exe /mixone & exit6⤵PID:5608
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xa4nuje1.njk\005.exe & exit6⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\xa4nuje1.njk\005.exeC:\Users\Admin\AppData\Local\Temp\xa4nuje1.njk\005.exe7⤵PID:5716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qsmmx5ts.zyb\installer.exe /qn CAMPAIGN="654" & exit6⤵
- Executes dropped EXE
- Checks computer location settings
PID:5840 -
C:\Users\Admin\AppData\Local\Temp\qsmmx5ts.zyb\installer.exeC:\Users\Admin\AppData\Local\Temp\qsmmx5ts.zyb\installer.exe /qn CAMPAIGN="654"7⤵PID:1452
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\qsmmx5ts.zyb\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\qsmmx5ts.zyb\ EXE_CMD_LINE="/forcecleanup /wintime 1621083795 /qn CAMPAIGN=""654"" " CAMPAIGN="654"8⤵PID:204
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2z4olgbr.cnw\702564a0.exe & exit6⤵PID:200
-
C:\Users\Admin\AppData\Local\Temp\2z4olgbr.cnw\702564a0.exeC:\Users\Admin\AppData\Local\Temp\2z4olgbr.cnw\702564a0.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\svx3m1ok.3qf\app.exe /8-2222 & exit6⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\svx3m1ok.3qf\app.exeC:\Users\Admin\AppData\Local\Temp\svx3m1ok.3qf\app.exe /8-22227⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\svx3m1ok.3qf\app.exe"C:\Users\Admin\AppData\Local\Temp\svx3m1ok.3qf\app.exe" /8-22228⤵
- Modifies data under HKEY_USERS
PID:6232
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0nfqnrbv.mi5\Setup3310.exe /Verysilent /subid=623 & exit6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5348 -
C:\Users\Admin\AppData\Local\Temp\0nfqnrbv.mi5\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\0nfqnrbv.mi5\Setup3310.exe /Verysilent /subid=6237⤵
- Executes dropped EXE
PID:5660 -
C:\Users\Admin\AppData\Local\Temp\is-O78IN.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-O78IN.tmp\Setup3310.tmp" /SL5="$403AE,138429,56832,C:\Users\Admin\AppData\Local\Temp\0nfqnrbv.mi5\Setup3310.exe" /Verysilent /subid=6238⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\is-V7PKI.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-V7PKI.tmp\Setup.exe" /Verysilent9⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5256 -
C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe"C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe"10⤵
- Executes dropped EXE
PID:5304 -
C:\Users\Admin\AppData\Roaming\4101025.exe"C:\Users\Admin\AppData\Roaming\4101025.exe"11⤵
- Executes dropped EXE
PID:2200
-
-
C:\Users\Admin\AppData\Roaming\3098036.exe"C:\Users\Admin\AppData\Roaming\3098036.exe"11⤵PID:3836
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"12⤵
- Executes dropped EXE
PID:4224
-
-
-
C:\Users\Admin\AppData\Roaming\8428532.exe"C:\Users\Admin\AppData\Roaming\8428532.exe"11⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5728
-
-
C:\Users\Admin\AppData\Roaming\4276172.exe"C:\Users\Admin\AppData\Roaming\4276172.exe"11⤵
- Executes dropped EXE
PID:4648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 210012⤵
- Drops file in Windows directory
- Program crash
PID:9908
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\askinstall38.exe"C:\Program Files (x86)\Data Finder\Versium Research\askinstall38.exe"10⤵
- Executes dropped EXE
PID:6020 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe11⤵PID:3536
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe12⤵
- Kills process with taskkill
PID:5784
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\Data Finder\Versium Research\jg7_7wjg.exe"10⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:5440
-
-
C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"10⤵
- Executes dropped EXE
PID:5824 -
C:\Users\Admin\AppData\Local\Temp\is-ACJ8G.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-ACJ8G.tmp\lylal220.tmp" /SL5="$3038C,237286,153600,C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"11⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\is-TIITF.tmp\4_177039.exe"C:\Users\Admin\AppData\Local\Temp\is-TIITF.tmp\4_177039.exe" /S /UID=lylal22012⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:4872 -
C:\Program Files\Windows Media Player\VXFUDCWIRB\irecord.exe"C:\Program Files\Windows Media Player\VXFUDCWIRB\irecord.exe" /VERYSILENT13⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\is-4ID9P.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-4ID9P.tmp\irecord.tmp" /SL5="$402E4,6139911,56832,C:\Program Files\Windows Media Player\VXFUDCWIRB\irecord.exe" /VERYSILENT14⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4924 -
C:\Program Files (x86)\recording\i-record.exe"C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu15⤵
- Executes dropped EXE
PID:5740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\82-50fcb-bec-1ae87-c12a43d913e9d\Laewidifepe.exe"C:\Users\Admin\AppData\Local\Temp\82-50fcb-bec-1ae87-c12a43d913e9d\Laewidifepe.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\19-d710a-4c6-0e09d-954e3f75ebb77\Vagishavata.exe"C:\Users\Admin\AppData\Local\Temp\19-d710a-4c6-0e09d-954e3f75ebb77\Vagishavata.exe"13⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0tdhcavl.giq\001.exe & exit14⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\0tdhcavl.giq\001.exeC:\Users\Admin\AppData\Local\Temp\0tdhcavl.giq\001.exe15⤵PID:5476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\idewyuqx.rw3\installer.exe /qn CAMPAIGN="654" & exit14⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\idewyuqx.rw3\installer.exeC:\Users\Admin\AppData\Local\Temp\idewyuqx.rw3\installer.exe /qn CAMPAIGN="654"15⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:5444 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\idewyuqx.rw3\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\idewyuqx.rw3\ EXE_CMD_LINE="/forcecleanup /wintime 1621083795 /qn CAMPAIGN=""654"" " CAMPAIGN="654"16⤵PID:6436
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s4uyl0qy.0bh\hbggg.exe & exit14⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\s4uyl0qy.0bh\hbggg.exeC:\Users\Admin\AppData\Local\Temp\s4uyl0qy.0bh\hbggg.exe15⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵PID:4880
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\opshk14u.h1b\google-game.exe & exit14⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\opshk14u.h1b\google-game.exeC:\Users\Admin\AppData\Local\Temp\opshk14u.h1b\google-game.exe15⤵
- Checks computer location settings
- Modifies registry class
PID:7160 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser16⤵PID:1432
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\i1puqwkc.sbm\setup.exe & exit14⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\i1puqwkc.sbm\setup.exeC:\Users\Admin\AppData\Local\Temp\i1puqwkc.sbm\setup.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:4816 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\i1puqwkc.sbm\setup.exe"16⤵PID:4976
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300017⤵
- Runs ping.exe
PID:6456
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dshfkh2j.ird\customer1.exe & exit14⤵PID:5352
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\dshfkh2j.ird\customer1.exeC:\Users\Admin\AppData\Local\Temp\dshfkh2j.ird\customer1.exe15⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵PID:3016
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ve11toe5.nkq\toolspab1.exe & exit14⤵PID:6360
-
C:\Users\Admin\AppData\Local\Temp\ve11toe5.nkq\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\ve11toe5.nkq\toolspab1.exe15⤵
- Suspicious use of SetThreadContext
PID:7064 -
C:\Users\Admin\AppData\Local\Temp\ve11toe5.nkq\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\ve11toe5.nkq\toolspab1.exe16⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2764
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wgigaujo.s4k\GcleanerWW.exe /mixone & exit14⤵PID:6060
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\onb0k5nt.bxy\005.exe & exit14⤵
- Executes dropped EXE
PID:5716 -
C:\Users\Admin\AppData\Local\Temp\onb0k5nt.bxy\005.exeC:\Users\Admin\AppData\Local\Temp\onb0k5nt.bxy\005.exe15⤵PID:6036
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vpelmno4.hv0\installer.exe /qn CAMPAIGN="654" & exit14⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\vpelmno4.hv0\installer.exeC:\Users\Admin\AppData\Local\Temp\vpelmno4.hv0\installer.exe /qn CAMPAIGN="654"15⤵PID:6940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qy4c4aet.gse\702564a0.exe & exit14⤵PID:6556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵
- Executes dropped EXE
PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\qy4c4aet.gse\702564a0.exeC:\Users\Admin\AppData\Local\Temp\qy4c4aet.gse\702564a0.exe15⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3eztijd2.i1z\app.exe /8-2222 & exit14⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\3eztijd2.i1z\app.exeC:\Users\Admin\AppData\Local\Temp\3eztijd2.i1z\app.exe /8-222215⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\3eztijd2.i1z\app.exe"C:\Users\Admin\AppData\Local\Temp\3eztijd2.i1z\app.exe" /8-222216⤵PID:5516
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ijggusef.pec\Setup3310.exe /Verysilent /subid=623 & exit14⤵PID:6796
-
C:\Users\Admin\AppData\Local\Temp\ijggusef.pec\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\ijggusef.pec\Setup3310.exe /Verysilent /subid=62315⤵PID:7364
-
C:\Users\Admin\AppData\Local\Temp\is-RLI8P.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-RLI8P.tmp\Setup3310.tmp" /SL5="$30314,138429,56832,C:\Users\Admin\AppData\Local\Temp\ijggusef.pec\Setup3310.exe" /Verysilent /subid=62316⤵
- Suspicious use of FindShellTrayWindow
PID:7416 -
C:\Users\Admin\AppData\Local\Temp\is-VIV9V.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-VIV9V.tmp\Setup.exe" /Verysilent17⤵PID:6292
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"10⤵PID:5720
-
-
C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
PID:5692 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",install11⤵PID:6036
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"10⤵PID:5452
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RunWW.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe" & del C:\ProgramData\*.dll & exit11⤵PID:4568
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im RunWW.exe /f12⤵
- Kills process with taskkill
PID:3612
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 612⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Delays execution with timeout.exe
- Suspicious use of FindShellTrayWindow
PID:1452
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"10⤵
- Executes dropped EXE
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
- Executes dropped EXE
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵PID:2604
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe" >> NUL3⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg6_6asg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg6_6asg.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\gaoou.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\gaoou.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5676 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:5652
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:2160
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:4668
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1180
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4940
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3792
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5156 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C12CF8359694362C548E0C2223C11B75 C2⤵
- Loads dropped DLL
PID:5356
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8E2504488852D8EDF74DA91FC035FDA52⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5492 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:5700
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 343A5CE3695A7FC36608389CBEB9C2ED E Global\MSI00002⤵
- Loads dropped DLL
PID:5252
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 368E38341DA16478147DDC14BEA85063 C2⤵
- Loads dropped DLL
PID:6100
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 952D1860FEEB31AA4B481F20AC1DE9EA2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4432 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:1400
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 32F37852CCBEBADF19313F5604B7B9D1 E Global\MSI00002⤵
- Loads dropped DLL
PID:5072
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EFCF428016677440BA40D97B89E18DE3 C2⤵PID:6224
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AFD897F8B433400AC3F052ABD53368402⤵
- Blocklisted process makes network request
PID:2896 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:3724
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EDED7CB41180BC87830C3256F87050F2 E Global\MSI00002⤵PID:2700
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:5220
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5340
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5148
-
C:\Users\Admin\AppData\Local\Temp\2D4A.exeC:\Users\Admin\AppData\Local\Temp\2D4A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4108
-
C:\Users\Admin\AppData\Local\Temp\423B.exeC:\Users\Admin\AppData\Local\Temp\423B.exe1⤵
- Executes dropped EXE
PID:5708
-
C:\Users\Admin\AppData\Local\Temp\46EF.exeC:\Users\Admin\AppData\Local\Temp\46EF.exe1⤵
- Executes dropped EXE
PID:6016
-
C:\Users\Admin\AppData\Local\Temp\is-7C6FO.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-7C6FO.tmp\LabPicV3.tmp" /SL5="$30364,506127,422400,C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5644 -
C:\Users\Admin\AppData\Local\Temp\is-DKN1G.tmp\3316505.exe"C:\Users\Admin\AppData\Local\Temp\is-DKN1G.tmp\3316505.exe" /S /UID=lab2142⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:5200 -
C:\Program Files\7-Zip\TOCVTUHSBI\prolab.exe"C:\Program Files\7-Zip\TOCVTUHSBI\prolab.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:5608 -
C:\Users\Admin\AppData\Local\Temp\is-TI8VS.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-TI8VS.tmp\prolab.tmp" /SL5="$40322,575243,216576,C:\Program Files\7-Zip\TOCVTUHSBI\prolab.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\3c-d17a5-8bc-b9180-f9e380cf48abc\Begishishaelo.exe"C:\Users\Admin\AppData\Local\Temp\3c-d17a5-8bc-b9180-f9e380cf48abc\Begishishaelo.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
PID:5396
-
-
C:\Users\Admin\AppData\Local\Temp\fb-4b4c4-394-2cfb1-f0dc5c6e7c132\Fuparedope.exe"C:\Users\Admin\AppData\Local\Temp\fb-4b4c4-394-2cfb1-f0dc5c6e7c132\Fuparedope.exe"3⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\orp53yup.tq3\001.exe & exit4⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\orp53yup.tq3\001.exeC:\Users\Admin\AppData\Local\Temp\orp53yup.tq3\001.exe5⤵PID:4460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hg5qopds.z5u\installer.exe /qn CAMPAIGN="654" & exit4⤵PID:5316
-
C:\Users\Admin\AppData\Local\Temp\hg5qopds.z5u\installer.exeC:\Users\Admin\AppData\Local\Temp\hg5qopds.z5u\installer.exe /qn CAMPAIGN="654"5⤵PID:5328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kkqqnqzp.klb\hbggg.exe & exit4⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\kkqqnqzp.klb\hbggg.exeC:\Users\Admin\AppData\Local\Temp\kkqqnqzp.klb\hbggg.exe5⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:6436
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mjyckf32.z5a\google-game.exe & exit4⤵PID:6792
-
C:\Users\Admin\AppData\Local\Temp\mjyckf32.z5a\google-game.exeC:\Users\Admin\AppData\Local\Temp\mjyckf32.z5a\google-game.exe5⤵
- Checks computer location settings
PID:6560 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser6⤵PID:6596
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5akhwfg3.0et\setup.exe & exit4⤵PID:5480
-
C:\Users\Admin\AppData\Local\Temp\5akhwfg3.0et\setup.exeC:\Users\Admin\AppData\Local\Temp\5akhwfg3.0et\setup.exe5⤵PID:4032
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\5akhwfg3.0et\setup.exe"6⤵PID:5176
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30007⤵
- Runs ping.exe
PID:2592
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fkkkcbej.cbk\customer1.exe & exit4⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\fkkkcbej.cbk\customer1.exeC:\Users\Admin\AppData\Local\Temp\fkkkcbej.cbk\customer1.exe5⤵PID:6848
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:6612
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Suspicious use of SetThreadContext
PID:4376
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sbbdonvc.kh5\toolspab1.exe & exit4⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\sbbdonvc.kh5\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\sbbdonvc.kh5\toolspab1.exe5⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\sbbdonvc.kh5\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\sbbdonvc.kh5\toolspab1.exe6⤵PID:6280
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kekhofjo.q2q\GcleanerWW.exe /mixone & exit4⤵PID:2240
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gq001ozt.k3t\005.exe & exit4⤵PID:6448
-
C:\Users\Admin\AppData\Local\Temp\gq001ozt.k3t\005.exeC:\Users\Admin\AppData\Local\Temp\gq001ozt.k3t\005.exe5⤵PID:5612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nyz4gfsp.yu4\installer.exe /qn CAMPAIGN="654" & exit4⤵
- Loads dropped DLL
PID:6036 -
C:\Users\Admin\AppData\Local\Temp\nyz4gfsp.yu4\installer.exeC:\Users\Admin\AppData\Local\Temp\nyz4gfsp.yu4\installer.exe /qn CAMPAIGN="654"5⤵PID:3744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ffhvkrgr.ef3\702564a0.exe & exit4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies registry class
PID:6980 -
C:\Users\Admin\AppData\Local\Temp\ffhvkrgr.ef3\702564a0.exeC:\Users\Admin\AppData\Local\Temp\ffhvkrgr.ef3\702564a0.exe5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ze4e4ktq.25i\app.exe /8-2222 & exit4⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\ze4e4ktq.25i\app.exeC:\Users\Admin\AppData\Local\Temp\ze4e4ktq.25i\app.exe /8-22225⤵PID:7256
-
C:\Users\Admin\AppData\Local\Temp\ze4e4ktq.25i\app.exe"C:\Users\Admin\AppData\Local\Temp\ze4e4ktq.25i\app.exe" /8-22226⤵
- Modifies data under HKEY_USERS
PID:7736
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\o0vapxae.afm\Setup3310.exe /Verysilent /subid=623 & exit4⤵PID:6696
-
C:\Users\Admin\AppData\Local\Temp\o0vapxae.afm\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\o0vapxae.afm\Setup3310.exe /Verysilent /subid=6235⤵PID:7464
-
C:\Users\Admin\AppData\Local\Temp\is-82NS5.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-82NS5.tmp\Setup3310.tmp" /SL5="$7036C,138429,56832,C:\Users\Admin\AppData\Local\Temp\o0vapxae.afm\Setup3310.exe" /Verysilent /subid=6236⤵
- Suspicious use of FindShellTrayWindow
PID:7528 -
C:\Users\Admin\AppData\Local\Temp\is-DHA5O.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-DHA5O.tmp\Setup.exe" /Verysilent7⤵
- Drops file in Program Files directory
PID:1056
-
-
-
-
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\EB5E.exeC:\Users\Admin\AppData\Local\Temp\EB5E.exe1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
PID:4940 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $true2⤵PID:3016
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Checks processor information in registry
PID:5452 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $true3⤵PID:5952
-
-
C:\Windows\System\spoolsv.exe"C:\Windows\System\spoolsv.exe" --MaxCircuitDirtiness 60 --NewCircuitPeriod 1 --MaxClientCircuitsPending 1024 --OptimisticData 1 --KeepalivePeriod 30 --CircuitBuildTimeout 10 --EnforceDistinctSubnets 0 --HardwareAccel 1 --UseEntryGuards 03⤵PID:7152
-
-
-
C:\Users\Admin\AppData\Local\Temp\F050.exeC:\Users\Admin\AppData\Local\Temp\F050.exe1⤵
- Suspicious use of SetThreadContext
PID:6604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵PID:6620
-
-
C:\Users\Admin\AppData\Local\Temp\FC96.exeC:\Users\Admin\AppData\Local\Temp\FC96.exe1⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\13A.exeC:\Users\Admin\AppData\Local\Temp\13A.exe1⤵PID:7000
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5532
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3792
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:7056
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6852
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6708
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
PID:3836
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:7164
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6872
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7112
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:6632
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6168
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6980
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1992 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1992 -s 12042⤵
- Program crash
PID:6148
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:6792
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:8092
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5176
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:5180
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:8340
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8544
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8544 -s 16882⤵
- Program crash
PID:8756
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1