Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
ﱞﱞﱞ�...ﱞﱞ
windows7_x64
ﱞﱞﱞ�...ﱞﱞ
windows7_x64
ﱞﱞﱞ�...ﱞﱞ
windows7_x64
10ﱞﱞﱞ�...ﱞﱞ
windows7_x64
10win102
windows10_x64
10win102
windows10_x64
8win102
windows10_x64
8win102
windows10_x64
8win104
windows10_x64
10win104
windows10_x64
10win104
windows10_x64
8win104
windows10_x64
8win105
windows10_x64
8win105
windows10_x64
8win105
windows10_x64
8win105
windows10_x64
10win106
windows10_x64
10win106
windows10_x64
10win106
windows10_x64
10win106
windows10_x64
10win103
windows10_x64
10win103
windows10_x64
8win103
windows10_x64
8win103
windows10_x64
10win101
windows10_x64
10win101
windows10_x64
8win101
windows10_x64
10win101
windows10_x64
8win100
windows10_x64
10win100
windows10_x64
10win100
windows10_x64
8win100
windows10_x64
10Resubmissions
12/11/2024, 01:29
241112-bwgrxs1gnf 1008/07/2021, 12:18
210708-8z6d5h8z2n 1006/07/2021, 17:53
210706-g6we6sa7sa 1019/06/2021, 18:17
210619-vr8bj2dzfn 1017/06/2021, 21:39
210617-a9cvlnmrbx 1011/06/2021, 17:26
210611-wvab1yw2tj 1008/06/2021, 06:47
210608-qrbpch3y46 1008/06/2021, 06:47
210608-64tndgm1ln 1005/06/2021, 18:40
210605-cd6qpr55sx 1004/06/2021, 11:56
210604-5c416rs3ns 10Analysis
-
max time kernel
1017s -
max time network
1801s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18/05/2021, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Install2.exe
Resource
win7v20210410
Behavioral task
behavioral3
Sample
keygen-step-4.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
keygen-step-4d.exe
Resource
win7v20210410
Behavioral task
behavioral5
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral6
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral8
Sample
keygen-step-4d.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Install2.exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
keygen-step-4d.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
Install.exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
keygen-step-4d.exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral18
Sample
Install2.exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
keygen-step-4.exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
keygen-step-4d.exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral24
Sample
keygen-step-4d.exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
keygen-step-4.exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
keygen-step-4d.exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral30
Sample
Install2.exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
keygen-step-4.exe
Resource
win10v20210410
General
Malware Config
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
redline
agressia
135.181.170.166:44121
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral25/memory/4332-369-0x0000000000400000-0x000000000041C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 8064 created 4204 8064 svchost.exe 148 PID 8064 created 6224 8064 svchost.exe 306 PID 8064 created 6992 8064 svchost.exe 318 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 60 IoCs
flow pid Process 52 4924 cmd.exe 53 4924 cmd.exe 55 4924 cmd.exe 57 4924 cmd.exe 82 5168 MsiExec.exe 84 5168 MsiExec.exe 86 5168 MsiExec.exe 88 5168 MsiExec.exe 90 5168 MsiExec.exe 91 5168 MsiExec.exe 92 5168 MsiExec.exe 93 5168 MsiExec.exe 94 5168 MsiExec.exe 95 5168 MsiExec.exe 96 5168 MsiExec.exe 97 5168 MsiExec.exe 99 5168 MsiExec.exe 100 5168 MsiExec.exe 101 5168 MsiExec.exe 102 5168 MsiExec.exe 103 5168 MsiExec.exe 104 5168 MsiExec.exe 108 5168 MsiExec.exe 109 5168 MsiExec.exe 111 5168 MsiExec.exe 112 5168 MsiExec.exe 113 5168 MsiExec.exe 114 5168 MsiExec.exe 115 5168 MsiExec.exe 116 5168 MsiExec.exe 131 5168 MsiExec.exe 132 5168 MsiExec.exe 133 5168 MsiExec.exe 134 5168 MsiExec.exe 136 5168 MsiExec.exe 137 5168 MsiExec.exe 138 5168 MsiExec.exe 139 5168 MsiExec.exe 140 5168 MsiExec.exe 141 5168 MsiExec.exe 144 5168 MsiExec.exe 146 5168 MsiExec.exe 147 5168 MsiExec.exe 148 5168 MsiExec.exe 149 5168 MsiExec.exe 150 5168 MsiExec.exe 151 5168 MsiExec.exe 153 5168 MsiExec.exe 154 5168 MsiExec.exe 155 5168 MsiExec.exe 156 5168 MsiExec.exe 158 5168 MsiExec.exe 358 6088 MsiExec.exe 359 6088 MsiExec.exe 360 6088 MsiExec.exe 362 6088 MsiExec.exe 617 8936 MsiExec.exe 619 8936 MsiExec.exe 620 8936 MsiExec.exe 621 8936 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Ultra.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 3316505.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 4_177039.exe -
Executes dropped EXE 64 IoCs
pid Process 1208 Install.tmp 3728 Ultra.exe 3452 ultramediaburner.exe 2192 ultramediaburner.tmp 932 Dofexehace.exe 2980 Lihizhaelyra.exe 3212 UltraMediaBurner.exe 4244 001.exe 4468 installer.exe 4720 hbggg.exe 4824 jfiag3g_gg.exe 4168 google-game.exe 3784 jfiag3g_gg.exe 4268 setup.exe 5316 customer1.exe 5444 jfiag3g_gg.exe 5592 toolspab1.exe 5896 702564a0.exe 5940 toolspab1.exe 4980 Setup3310.tmp 6052 installer.exe 5160 702564a0.exe 4204 app.exe 1132 Setup3310.exe 2824 Setup3310.tmp 5964 7688.exe 5516 taskkill.exe 4488 Setup.exe 5392 hbggg.exe 5772 hjjgaa.exe 5004 RunWW.exe 3880 8531.exe 1768 ZHyvibihyzhy.exe 5788 guihuali-game.exe 5804 LabPicV3.exe 5808 lylal220.exe 1772 jg7_7wjg.exe 4568 askinstall38.exe 4508 Setup3310.tmp 4524 lylal220.tmp 4344 svchost.exe 4928 jfiag3g_gg.exe 4912 spoolsv.exe 2816 3316505.exe 576 1869389.exe 5684 4_177039.exe 5468 7278506.exe 4504 8037932.exe 6108 1712773.exe 4872 jfiag3g_gg.exe 5156 Conhost.exe 5944 prolab.tmp 4104 Narevedyzhae.exe 1768 ZHyvibihyzhy.exe 1912 irecord.exe 5024 irecord.tmp 5384 Qaqojumilo.exe 4444 Jucepinymo.exe 2764 i-record.exe 5240 001.exe 6280 001.exe 6644 installer.exe 6684 installer.exe 6240 hbggg.exe -
resource yara_rule behavioral25/files/0x000100000001abdb-170.dat upx behavioral25/files/0x000100000001abdb-171.dat upx behavioral25/files/0x000100000001ac18-233.dat upx behavioral25/files/0x000100000001ac18-234.dat upx behavioral25/files/0x000100000001ac20-281.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8037932.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8037932.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation google-game.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation guihuali-game.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Narevedyzhae.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Qaqojumilo.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation google-game.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation google-game.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Dofexehace.exe -
Loads dropped DLL 64 IoCs
pid Process 1208 Install.tmp 4468 installer.exe 4468 installer.exe 4468 installer.exe 5108 MsiExec.exe 5108 MsiExec.exe 4240 rUNdlL32.eXe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 5168 MsiExec.exe 4468 installer.exe 5168 MsiExec.exe 5168 MsiExec.exe 5940 toolspab1.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 5168 MsiExec.exe 6052 installer.exe 6052 installer.exe 6052 installer.exe 4628 MsiExec.exe 4628 MsiExec.exe 2824 Setup3310.tmp 2824 Setup3310.tmp 5160 702564a0.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 6088 MsiExec.exe 4524 lylal220.tmp 4508 Setup3310.tmp 4912 spoolsv.exe 4912 spoolsv.exe 4912 spoolsv.exe 4912 spoolsv.exe 4912 spoolsv.exe 4912 spoolsv.exe 4912 spoolsv.exe 2560 rUNdlL32.eXe 6088 MsiExec.exe 5392 hbggg.exe 6088 MsiExec.exe 6088 MsiExec.exe 6052 installer.exe 6088 MsiExec.exe 6088 MsiExec.exe 5004 RunWW.exe 5004 RunWW.exe 2316 MsiExec.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Portable Devices\\Velupaejiky.exe\"" Ultra.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host Service = "C:\\Windows\\System\\svchost.exe" 7688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Google\\Gitaenijunu.exe\"" 3316505.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Mail\\Jecunolyxu.exe\"" 4_177039.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg7_7wjg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8037932.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\Q: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 469 ipinfo.io 41 ip-api.com 197 ipinfo.io 199 ipinfo.io 353 ip-api.com 457 ipinfo.io 459 ipinfo.io -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent FEBC2DCFFF8EB4F0 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent EECB291284E16DD5 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4504 8037932.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3696 set thread context of 4604 3696 svchost.exe 105 PID 5592 set thread context of 5940 5592 toolspab1.exe 126 PID 5516 set thread context of 4332 5516 taskkill.exe 170 PID 1288 set thread context of 7292 1288 installer.exe 277 PID 3104 set thread context of 6480 3104 toolspab1.exe 278 PID 10024 set thread context of 4484 10024 bcdjtst 352 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Picture Lab\is-G7032.tmp prolab.tmp File opened for modification C:\Program Files (x86)\recording\swscale-2.dll irecord.tmp File created C:\Program Files (x86)\Windows Mail\Jecunolyxu.exe.config 4_177039.exe File created C:\Program Files (x86)\recording\is-J3DVV.tmp irecord.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-7MSM8.tmp ultramediaburner.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp File created C:\Program Files (x86)\recording\is-U4K9H.tmp irecord.tmp File created C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\recording\is-1M5L1.tmp irecord.tmp File created C:\Program Files (x86)\Data Finder\Versium Research\d jg7_7wjg.exe File created C:\Program Files (x86)\UltraMediaBurner\is-CEF30.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe Setup.exe File created C:\Program Files (x86)\Data Finder\Versium Research\Uninstall.ini Setup.exe File created C:\Program Files (x86)\Picture Lab\is-P5VB2.tmp prolab.tmp File created C:\Program Files (x86)\recording\is-IKSCE.tmp irecord.tmp File created C:\Program Files (x86)\Data Finder\Versium Research\d.jfm jg7_7wjg.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe Setup.exe File created C:\Program Files (x86)\Google\Gitaenijunu.exe 3316505.exe File opened for modification C:\Program Files (x86)\recording\avcodec-53.dll irecord.tmp File created C:\Program Files (x86)\Picture Lab\is-ISKPE.tmp prolab.tmp File created C:\Program Files (x86)\recording\is-RM37J.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-KR9R5.tmp irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files\Common Files\WDJRNKTYTI\irecord.exe 4_177039.exe File created C:\Program Files\Common Files\WDJRNKTYTI\irecord.exe.config 4_177039.exe File opened for modification C:\Program Files (x86)\Picture Lab\DockingToolbar.dll prolab.tmp File opened for modification C:\Program Files (x86)\Picture Lab\WeifenLuo.WinFormsUI.dll prolab.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\Uninstall.exe Setup.exe File created C:\Program Files\VideoLAN\HVEARVBGOV\prolab.exe.config 3316505.exe File created C:\Program Files (x86)\Google\Gitaenijunu.exe.config 3316505.exe File created C:\Program Files (x86)\Picture Lab\is-E0LII.tmp prolab.tmp File created C:\Program Files (x86)\recording\is-JIONQ.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-VCBEB.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe Setup.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe Setup.exe File created C:\Program Files (x86)\Picture Lab\is-95QOJ.tmp prolab.tmp File opened for modification C:\Program Files (x86)\recording\AForge.Video.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\recording\is-F86E3.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\d jg7_7wjg.exe File created C:\Program Files\Windows Photo Viewer\ZUGYGHNLMT\ultramediaburner.exe Ultra.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe Setup.exe File opened for modification C:\Program Files (x86)\recording\avfilter-2.dll irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe Setup.exe File opened for modification C:\Program Files (x86)\Picture Lab\Pictures Lab.exe prolab.tmp File opened for modification C:\Program Files (x86)\recording\Bunifu_UI_v1.52.dll irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\d.INTEG.RAW jg7_7wjg.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\askinstall38.exe Setup.exe File created C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File opened for modification C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File created C:\Program Files (x86)\Data Finder\Versium Research\tmp.edb jg7_7wjg.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe Setup.exe File created C:\Program Files\Windows Photo Viewer\ZUGYGHNLMT\ultramediaburner.exe.config Ultra.exe File created C:\Program Files (x86)\Windows Portable Devices\Velupaejiky.exe Ultra.exe File opened for modification C:\Program Files (x86)\Picture Lab\SourceGrid2.dll prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-TQJ0E.tmp prolab.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\Picture Lab\is-3GD5R.tmp prolab.tmp File opened for modification C:\Program Files (x86)\recording\avdevice-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.exe irecord.tmp -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System\libevent-2-1-7.dll svchost.exe File opened for modification C:\Windows\System\libevent_extra-2-1-7.dll svchost.exe File opened for modification C:\Windows\Installer\MSIB4F9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA90C.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\System\xxx1.bak 7688.exe File opened for modification C:\Windows\Installer\MSI7C01.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIB239.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB642.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBC4F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBE73.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC03B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC1D3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI26C7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9F57.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB76C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBF20.tmp msiexec.exe File opened for modification C:\Windows\System\libcrypto-1_1.dll svchost.exe File opened for modification C:\Windows\Installer\MSIBEBE.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIBA1C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBF9E.tmp msiexec.exe File created C:\Windows\Installer\f74969b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7D9A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA3A0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1861.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIAFF4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7E56.tmp msiexec.exe File opened for modification C:\Windows\System\libgcc_s_sjlj-1.dll svchost.exe File opened for modification C:\Windows\System\libssp-0.dll svchost.exe File opened for modification C:\Windows\Installer\MSIDAD.tmp msiexec.exe File opened for modification C:\Windows\Installer\f749698.msi msiexec.exe File opened for modification C:\Windows\System\svchost.exe 7688.exe File opened for modification C:\Windows\Installer\MSI3772.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3B8A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA3F7.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\System\spoolsv.tar svchost.exe File opened for modification C:\Windows\Installer\MSI1475.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA66A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB622.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1B3B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2E98.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC136.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIC659.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE1BC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI167A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI17D3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBE66.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA550.tmp msiexec.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\System\spoolsv.exe svchost.exe File opened for modification C:\Windows\Installer\MSIBAE4.tmp msiexec.exe File opened for modification C:\Windows\System\libevent_core-2-1-7.dll svchost.exe File opened for modification C:\Windows\Installer\MSIA2F3.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\f749698.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB322.tmp msiexec.exe File created C:\Windows\System\svchost.exe 7688.exe File opened for modification C:\Windows\Installer\MSI7D5A.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
pid pid_target Process procid_target 7364 7528 WerFault.exe 266 5972 6108 WerFault.exe 198 3308 4300 WerFault.exe 346 10308 4680 WerFault.exe 364 10492 10416 WerFault.exe 367 -
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI svdjtst Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bcdjtst Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI svdjtst Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI svdjtst Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bcdjtst Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bcdjtst Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 702564a0.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RunWW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RunWW.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6652 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 5 IoCs
pid Process 5500 taskkill.exe 4460 taskkill.exe 5516 taskkill.exe 4312 taskkill.exe 8924 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main taskkill.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main cmd.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" app.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e5f4880ce74bd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 7e60b03ae84bd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = fd365f00e74bd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164C = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 605d913ae84bd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 06196c80e64bd701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance google-game.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\PackageCode = "6BBF4B2F4524B25478C17BFBEE2559F7" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\en-US = "en-US.1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e327f508e74bd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\MrtCache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QJ2559JN-BF7A-LM2A-20M4-JBF9M43Q7G3S} svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = 010000002a6d5da8447f8b1fcc74212de70fafba0acb078098f528f3f961b3e8df58fa1133c062542fa6a17e24a0ec666eaec686f990d43475c551feb3934ef4e2e3876d4ec03cb117c62d508ae0798a0241dc18267be2d706379b00bb0e MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{20EBF94D-05AF-4639-8880-3BC68B1DA574} = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\Certificates\33E4E = 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 MicrosoftEdgeCP.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 7376 PING.EXE 5252 PING.EXE 7180 PING.EXE -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 198 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 202 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 458 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 461 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 468 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 470 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2192 ultramediaburner.tmp 2192 ultramediaburner.tmp 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe 2980 Lihizhaelyra.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2756 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 5940 toolspab1.exe 5160 702564a0.exe 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 7292 toolspab1.exe 4272 explorer.exe 4272 explorer.exe 4684 explorer.exe 4684 explorer.exe 4940 explorer.exe 4940 explorer.exe 5896 702564a0.exe 4896 702564a0.exe 4940 explorer.exe 4940 explorer.exe 4684 explorer.exe 4684 explorer.exe 4272 explorer.exe 4272 explorer.exe 4684 explorer.exe 4684 explorer.exe 4272 explorer.exe 4272 explorer.exe 4940 explorer.exe 4940 explorer.exe 8952 MicrosoftEdgeCP.exe 8952 MicrosoftEdgeCP.exe 4684 explorer.exe 4684 explorer.exe 4940 explorer.exe 4940 explorer.exe 4272 explorer.exe 4272 explorer.exe 4684 explorer.exe 4684 explorer.exe 4272 explorer.exe 4272 explorer.exe 4940 explorer.exe 4940 explorer.exe 4684 explorer.exe 4684 explorer.exe 4272 explorer.exe 4272 explorer.exe 4940 explorer.exe 4940 explorer.exe 4940 explorer.exe 4940 explorer.exe 4684 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3728 Ultra.exe Token: SeDebugPrivilege 932 Dofexehace.exe Token: SeDebugPrivilege 2980 Lihizhaelyra.exe Token: SeDebugPrivilege 3968 MicrosoftEdge.exe Token: SeDebugPrivilege 3968 MicrosoftEdge.exe Token: SeDebugPrivilege 3968 MicrosoftEdge.exe Token: SeDebugPrivilege 3968 MicrosoftEdge.exe Token: SeSecurityPrivilege 4888 msiexec.exe Token: SeCreateTokenPrivilege 4468 installer.exe Token: SeAssignPrimaryTokenPrivilege 4468 installer.exe Token: SeLockMemoryPrivilege 4468 installer.exe Token: SeIncreaseQuotaPrivilege 4468 installer.exe Token: SeMachineAccountPrivilege 4468 installer.exe Token: SeTcbPrivilege 4468 installer.exe Token: SeSecurityPrivilege 4468 installer.exe Token: SeTakeOwnershipPrivilege 4468 installer.exe Token: SeLoadDriverPrivilege 4468 installer.exe Token: SeSystemProfilePrivilege 4468 installer.exe Token: SeSystemtimePrivilege 4468 installer.exe Token: SeProfSingleProcessPrivilege 4468 installer.exe Token: SeIncBasePriorityPrivilege 4468 installer.exe Token: SeCreatePagefilePrivilege 4468 installer.exe Token: SeCreatePermanentPrivilege 4468 installer.exe Token: SeBackupPrivilege 4468 installer.exe Token: SeRestorePrivilege 4468 installer.exe Token: SeShutdownPrivilege 4468 installer.exe Token: SeDebugPrivilege 4468 installer.exe Token: SeAuditPrivilege 4468 installer.exe Token: SeSystemEnvironmentPrivilege 4468 installer.exe Token: SeChangeNotifyPrivilege 4468 installer.exe Token: SeRemoteShutdownPrivilege 4468 installer.exe Token: SeUndockPrivilege 4468 installer.exe Token: SeSyncAgentPrivilege 4468 installer.exe Token: SeEnableDelegationPrivilege 4468 installer.exe Token: SeManageVolumePrivilege 4468 installer.exe Token: SeImpersonatePrivilege 4468 installer.exe Token: SeCreateGlobalPrivilege 4468 installer.exe Token: SeDebugPrivilege 3968 MicrosoftEdge.exe Token: SeCreateTokenPrivilege 4468 installer.exe Token: SeAssignPrimaryTokenPrivilege 4468 installer.exe Token: SeLockMemoryPrivilege 4468 installer.exe Token: SeIncreaseQuotaPrivilege 4468 installer.exe Token: SeMachineAccountPrivilege 4468 installer.exe Token: SeTcbPrivilege 4468 installer.exe Token: SeSecurityPrivilege 4468 installer.exe Token: SeTakeOwnershipPrivilege 4468 installer.exe Token: SeLoadDriverPrivilege 4468 installer.exe Token: SeSystemProfilePrivilege 4468 installer.exe Token: SeSystemtimePrivilege 4468 installer.exe Token: SeProfSingleProcessPrivilege 4468 installer.exe Token: SeIncBasePriorityPrivilege 4468 installer.exe Token: SeCreatePagefilePrivilege 4468 installer.exe Token: SeCreatePermanentPrivilege 4468 installer.exe Token: SeBackupPrivilege 4468 installer.exe Token: SeRestorePrivilege 4468 installer.exe Token: SeShutdownPrivilege 4468 installer.exe Token: SeDebugPrivilege 4468 installer.exe Token: SeAuditPrivilege 4468 installer.exe Token: SeSystemEnvironmentPrivilege 4468 installer.exe Token: SeChangeNotifyPrivilege 4468 installer.exe Token: SeRemoteShutdownPrivilege 4468 installer.exe Token: SeUndockPrivilege 4468 installer.exe Token: SeSyncAgentPrivilege 4468 installer.exe Token: SeEnableDelegationPrivilege 4468 installer.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 2192 ultramediaburner.tmp 4468 installer.exe 6052 installer.exe 2824 Setup3310.tmp 2756 Process not Found 2756 Process not Found 5944 prolab.tmp 5024 irecord.tmp 1288 installer.exe 4980 Setup3310.tmp 4508 Setup3310.tmp -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3968 MicrosoftEdge.exe 4740 MicrosoftEdgeCP.exe 4740 MicrosoftEdgeCP.exe 6572 MicrosoftEdge.exe 8592 MicrosoftEdge.exe 8952 MicrosoftEdgeCP.exe 8952 MicrosoftEdgeCP.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2756 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 1208 3896 Install.exe 73 PID 3896 wrote to memory of 1208 3896 Install.exe 73 PID 3896 wrote to memory of 1208 3896 Install.exe 73 PID 1208 wrote to memory of 3728 1208 Install.tmp 76 PID 1208 wrote to memory of 3728 1208 Install.tmp 76 PID 3728 wrote to memory of 3452 3728 Ultra.exe 77 PID 3728 wrote to memory of 3452 3728 Ultra.exe 77 PID 3728 wrote to memory of 3452 3728 Ultra.exe 77 PID 3452 wrote to memory of 2192 3452 ultramediaburner.exe 78 PID 3452 wrote to memory of 2192 3452 ultramediaburner.exe 78 PID 3452 wrote to memory of 2192 3452 ultramediaburner.exe 78 PID 3728 wrote to memory of 932 3728 Ultra.exe 79 PID 3728 wrote to memory of 932 3728 Ultra.exe 79 PID 3728 wrote to memory of 2980 3728 Ultra.exe 80 PID 3728 wrote to memory of 2980 3728 Ultra.exe 80 PID 2192 wrote to memory of 3212 2192 ultramediaburner.tmp 81 PID 2192 wrote to memory of 3212 2192 ultramediaburner.tmp 81 PID 2980 wrote to memory of 3432 2980 Lihizhaelyra.exe 107 PID 2980 wrote to memory of 3432 2980 Lihizhaelyra.exe 107 PID 3432 wrote to memory of 4244 3432 DllHost.exe 87 PID 3432 wrote to memory of 4244 3432 DllHost.exe 87 PID 3432 wrote to memory of 4244 3432 DllHost.exe 87 PID 2980 wrote to memory of 4404 2980 Lihizhaelyra.exe 89 PID 2980 wrote to memory of 4404 2980 Lihizhaelyra.exe 89 PID 4404 wrote to memory of 4468 4404 cmd.exe 91 PID 4404 wrote to memory of 4468 4404 cmd.exe 91 PID 4404 wrote to memory of 4468 4404 cmd.exe 91 PID 2980 wrote to memory of 4620 2980 Lihizhaelyra.exe 92 PID 2980 wrote to memory of 4620 2980 Lihizhaelyra.exe 92 PID 4620 wrote to memory of 4720 4620 cmd.exe 94 PID 4620 wrote to memory of 4720 4620 cmd.exe 94 PID 4620 wrote to memory of 4720 4620 cmd.exe 94 PID 4720 wrote to memory of 4824 4720 hbggg.exe 96 PID 4720 wrote to memory of 4824 4720 hbggg.exe 96 PID 4720 wrote to memory of 4824 4720 hbggg.exe 96 PID 4888 wrote to memory of 5108 4888 msiexec.exe 100 PID 4888 wrote to memory of 5108 4888 msiexec.exe 100 PID 4888 wrote to memory of 5108 4888 msiexec.exe 100 PID 2980 wrote to memory of 2328 2980 Lihizhaelyra.exe 101 PID 2980 wrote to memory of 2328 2980 Lihizhaelyra.exe 101 PID 2328 wrote to memory of 4168 2328 cmd.exe 103 PID 2328 wrote to memory of 4168 2328 cmd.exe 103 PID 2328 wrote to memory of 4168 2328 cmd.exe 103 PID 4168 wrote to memory of 4240 4168 google-game.exe 104 PID 4168 wrote to memory of 4240 4168 google-game.exe 104 PID 4168 wrote to memory of 4240 4168 google-game.exe 104 PID 4240 wrote to memory of 3696 4240 rUNdlL32.eXe 28 PID 4240 wrote to memory of 2672 4240 rUNdlL32.eXe 18 PID 3696 wrote to memory of 4604 3696 svchost.exe 105 PID 3696 wrote to memory of 4604 3696 svchost.exe 105 PID 3696 wrote to memory of 4604 3696 svchost.exe 105 PID 4240 wrote to memory of 344 4240 rUNdlL32.eXe 58 PID 4240 wrote to memory of 2488 4240 rUNdlL32.eXe 20 PID 4240 wrote to memory of 2468 4240 rUNdlL32.eXe 22 PID 4468 wrote to memory of 2320 4468 installer.exe 106 PID 4468 wrote to memory of 2320 4468 installer.exe 106 PID 4468 wrote to memory of 2320 4468 installer.exe 106 PID 4240 wrote to memory of 1080 4240 rUNdlL32.eXe 53 PID 4240 wrote to memory of 936 4240 rUNdlL32.eXe 55 PID 4240 wrote to memory of 1412 4240 rUNdlL32.eXe 45 PID 4240 wrote to memory of 1904 4240 rUNdlL32.eXe 35 PID 4240 wrote to memory of 1268 4240 rUNdlL32.eXe 49 PID 4720 wrote to memory of 3784 4720 hbggg.exe 108 PID 4720 wrote to memory of 3784 4720 hbggg.exe 108
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2796
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2776
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2672
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\is-FUB0I.tmp\Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-FUB0I.tmp\Install.tmp" /SL5="$20118,235791,152064,C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\is-EGKGC.tmp\Ultra.exe"C:\Users\Admin\AppData\Local\Temp\is-EGKGC.tmp\Ultra.exe" /S /UID=burnerch13⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files\Windows Photo Viewer\ZUGYGHNLMT\ultramediaburner.exe"C:\Program Files\Windows Photo Viewer\ZUGYGHNLMT\ultramediaburner.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\is-R48SN.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-R48SN.tmp\ultramediaburner.tmp" /SL5="$70060,281924,62464,C:\Program Files\Windows Photo Viewer\ZUGYGHNLMT\ultramediaburner.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu6⤵
- Executes dropped EXE
PID:3212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1f-639a1-227-8f58c-5109ded1a9004\Dofexehace.exe"C:\Users\Admin\AppData\Local\Temp\1f-639a1-227-8f58c-5109ded1a9004\Dofexehace.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\a0-ad06d-105-c95b7-f356c92e42c0d\Lihizhaelyra.exe"C:\Users\Admin\AppData\Local\Temp\a0-ad06d-105-c95b7-f356c92e42c0d\Lihizhaelyra.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v24w5zp2.asc\001.exe & exit5⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\v24w5zp2.asc\001.exeC:\Users\Admin\AppData\Local\Temp\v24w5zp2.asc\001.exe6⤵
- Executes dropped EXE
PID:4244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\awyhnlzo.qma\installer.exe /qn CAMPAIGN="654" & exit5⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\awyhnlzo.qma\installer.exeC:\Users\Admin\AppData\Local\Temp\awyhnlzo.qma\installer.exe /qn CAMPAIGN="654"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\awyhnlzo.qma\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\awyhnlzo.qma\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1621083818 /qn CAMPAIGN=""654"" " CAMPAIGN="654"7⤵PID:2320
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w2gax0co.bwa\hbggg.exe & exit5⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\w2gax0co.bwa\hbggg.exeC:\Users\Admin\AppData\Local\Temp\w2gax0co.bwa\hbggg.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:9848
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:10496
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x3vu4u4b.hu0\google-game.exe & exit5⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\x3vu4u4b.hu0\google-game.exeC:\Users\Admin\AppData\Local\Temp\x3vu4u4b.hu0\google-game.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser7⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4240
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\miazhywt.5ui\setup.exe & exit5⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\miazhywt.5ui\setup.exeC:\Users\Admin\AppData\Local\Temp\miazhywt.5ui\setup.exe6⤵
- Executes dropped EXE
PID:4268 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\miazhywt.5ui\setup.exe"7⤵PID:4420
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30008⤵
- Runs ping.exe
PID:5252
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ya4zrmt3.zot\customer1.exe & exit5⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\ya4zrmt3.zot\customer1.exeC:\Users\Admin\AppData\Local\Temp\ya4zrmt3.zot\customer1.exe6⤵
- Executes dropped EXE
PID:5316 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:5444
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5896
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:9272
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:10528
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\c4dctopi.q0h\toolspab1.exe & exit5⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\c4dctopi.q0h\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\c4dctopi.q0h\toolspab1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5592 -
C:\Users\Admin\AppData\Local\Temp\c4dctopi.q0h\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\c4dctopi.q0h\toolspab1.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5940
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mogiuy1f.ayw\GcleanerWW.exe /mixone & exit5⤵PID:5424
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wrefry5e.g1a\005.exe & exit5⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\wrefry5e.g1a\005.exeC:\Users\Admin\AppData\Local\Temp\wrefry5e.g1a\005.exe6⤵PID:4980
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fc1lpl5o.1cj\installer.exe /qn CAMPAIGN="654" & exit5⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\fc1lpl5o.1cj\installer.exeC:\Users\Admin\AppData\Local\Temp\fc1lpl5o.1cj\installer.exe /qn CAMPAIGN="654"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:6052 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\fc1lpl5o.1cj\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\fc1lpl5o.1cj\ EXE_CMD_LINE="/forcecleanup /wintime 1621083818 /qn CAMPAIGN=""654"" " CAMPAIGN="654"7⤵PID:500
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\t5nej3uz.p2k\702564a0.exe & exit5⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\t5nej3uz.p2k\702564a0.exeC:\Users\Admin\AppData\Local\Temp\t5nej3uz.p2k\702564a0.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5160
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ixopp2tr.lmd\app.exe /8-2222 & exit5⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\ixopp2tr.lmd\app.exeC:\Users\Admin\AppData\Local\Temp\ixopp2tr.lmd\app.exe /8-22226⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\ixopp2tr.lmd\app.exe"C:\Users\Admin\AppData\Local\Temp\ixopp2tr.lmd\app.exe" /8-22227⤵
- Modifies data under HKEY_USERS
PID:6564
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pzs0d0sm.qbw\Setup3310.exe /Verysilent /subid=623 & exit5⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\pzs0d0sm.qbw\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\pzs0d0sm.qbw\Setup3310.exe /Verysilent /subid=6236⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\is-OG3H8.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-OG3H8.tmp\Setup3310.tmp" /SL5="$20220,138429,56832,C:\Users\Admin\AppData\Local\Temp\pzs0d0sm.qbw\Setup3310.exe" /Verysilent /subid=6237⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\is-PHOPL.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PHOPL.tmp\Setup.exe" /Verysilent8⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4488 -
C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"9⤵
- Executes dropped EXE
PID:5772 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
- Executes dropped EXE
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
- Executes dropped EXE
PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:9952
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:5464
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RunWW.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe" & del C:\ProgramData\*.dll & exit10⤵PID:5616
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im RunWW.exe /f11⤵
- Kills process with taskkill
- Modifies Internet Explorer settings
PID:4312
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
PID:6652
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe"C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe"9⤵PID:1768
-
C:\Users\Admin\AppData\Roaming\1869389.exe"C:\Users\Admin\AppData\Roaming\1869389.exe"10⤵
- Executes dropped EXE
PID:576
-
-
C:\Users\Admin\AppData\Roaming\7278506.exe"C:\Users\Admin\AppData\Roaming\7278506.exe"10⤵
- Executes dropped EXE
PID:5468
-
-
C:\Users\Admin\AppData\Roaming\8037932.exe"C:\Users\Admin\AppData\Roaming\8037932.exe"10⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4504
-
-
C:\Users\Admin\AppData\Roaming\1712773.exe"C:\Users\Admin\AppData\Roaming\1712773.exe"10⤵
- Executes dropped EXE
PID:6108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 218011⤵
- Program crash
PID:5972
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
PID:5788 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",install10⤵
- Loads dropped DLL
PID:2560
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"9⤵
- Executes dropped EXE
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\is-79CUC.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-79CUC.tmp\LabPicV3.tmp" /SL5="$20386,506127,422400,C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"10⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\is-E1O8H.tmp\3316505.exe"C:\Users\Admin\AppData\Local\Temp\is-E1O8H.tmp\3316505.exe" /S /UID=lab21411⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:2816 -
C:\Program Files\VideoLAN\HVEARVBGOV\prolab.exe"C:\Program Files\VideoLAN\HVEARVBGOV\prolab.exe" /VERYSILENT12⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\is-MI76A.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-MI76A.tmp\prolab.tmp" /SL5="$602B4,575243,216576,C:\Program Files\VideoLAN\HVEARVBGOV\prolab.exe" /VERYSILENT13⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\79-7e90b-2ea-57ca1-483e15694e745\Narevedyzhae.exe"C:\Users\Admin\AppData\Local\Temp\79-7e90b-2ea-57ca1-483e15694e745\Narevedyzhae.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\92-0e149-77b-5d39c-8b470a51a06ce\ZHyvibihyzhy.exe"C:\Users\Admin\AppData\Local\Temp\92-0e149-77b-5d39c-8b470a51a06ce\ZHyvibihyzhy.exe"12⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pu2aeocc.rfn\001.exe & exit13⤵
- Blocklisted process makes network request
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\pu2aeocc.rfn\001.exeC:\Users\Admin\AppData\Local\Temp\pu2aeocc.rfn\001.exe14⤵
- Executes dropped EXE
PID:6280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\12rjjqyc.a14\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\12rjjqyc.a14\installer.exeC:\Users\Admin\AppData\Local\Temp\12rjjqyc.a14\installer.exe /qn CAMPAIGN="654"14⤵
- Executes dropped EXE
PID:6684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bameivyf.o5d\hbggg.exe & exit13⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\bameivyf.o5d\hbggg.exeC:\Users\Admin\AppData\Local\Temp\bameivyf.o5d\hbggg.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5392 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:6724
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:6208
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:9316
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:11096
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tl2nfuxg.w2z\google-game.exe & exit13⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\tl2nfuxg.w2z\google-game.exeC:\Users\Admin\AppData\Local\Temp\tl2nfuxg.w2z\google-game.exe14⤵
- Checks computer location settings
PID:4292 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser15⤵PID:4188
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cnempnop.4rz\setup.exe & exit13⤵PID:8072
-
C:\Users\Admin\AppData\Local\Temp\cnempnop.4rz\setup.exeC:\Users\Admin\AppData\Local\Temp\cnempnop.4rz\setup.exe14⤵PID:4400
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\cnempnop.4rz\setup.exe"15⤵PID:6012
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300016⤵
- Runs ping.exe
PID:7180
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oecpqnob.l0b\customer1.exe & exit13⤵PID:7064
-
C:\Users\Admin\AppData\Local\Temp\oecpqnob.l0b\customer1.exeC:\Users\Admin\AppData\Local\Temp\oecpqnob.l0b\customer1.exe14⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:10356
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qg1c545x.ej1\toolspab1.exe & exit13⤵PID:7544
-
C:\Users\Admin\AppData\Local\Temp\qg1c545x.ej1\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\qg1c545x.ej1\toolspab1.exe14⤵
- Suspicious use of SetThreadContext
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\qg1c545x.ej1\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\qg1c545x.ej1\toolspab1.exe15⤵PID:6480
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\czkubyog.lsm\GcleanerWW.exe /mixone & exit13⤵PID:664
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rjcht25k.exc\005.exe & exit13⤵PID:6404
-
C:\Users\Admin\AppData\Local\Temp\rjcht25k.exc\005.exeC:\Users\Admin\AppData\Local\Temp\rjcht25k.exc\005.exe14⤵PID:6124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hfy1wkhu.wv0\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:7792
-
C:\Users\Admin\AppData\Local\Temp\hfy1wkhu.wv0\installer.exeC:\Users\Admin\AppData\Local\Temp\hfy1wkhu.wv0\installer.exe /qn CAMPAIGN="654"14⤵PID:1812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4c2bbe01.r53\702564a0.exe & exit13⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\4c2bbe01.r53\702564a0.exeC:\Users\Admin\AppData\Local\Temp\4c2bbe01.r53\702564a0.exe14⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tyec50ck.doe\app.exe /8-2222 & exit13⤵PID:8108
-
C:\Users\Admin\AppData\Local\Temp\tyec50ck.doe\app.exeC:\Users\Admin\AppData\Local\Temp\tyec50ck.doe\app.exe /8-222214⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\tyec50ck.doe\app.exe"C:\Users\Admin\AppData\Local\Temp\tyec50ck.doe\app.exe" /8-222215⤵PID:4700
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\d0inhh3d.bk3\Setup3310.exe /Verysilent /subid=623 & exit13⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\d0inhh3d.bk3\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\d0inhh3d.bk3\Setup3310.exe /Verysilent /subid=62314⤵PID:7408
-
C:\Users\Admin\AppData\Local\Temp\is-QT3I3.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-QT3I3.tmp\Setup3310.tmp" /SL5="$104EC,138429,56832,C:\Users\Admin\AppData\Local\Temp\d0inhh3d.bk3\Setup3310.exe" /Verysilent /subid=62315⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\is-H9LVU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-H9LVU.tmp\Setup.exe" /Verysilent16⤵
- Drops file in Program Files directory
PID:6620
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"9⤵
- Executes dropped EXE
PID:5808 -
C:\Users\Admin\AppData\Local\Temp\is-KS59Q.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-KS59Q.tmp\lylal220.tmp" /SL5="$30314,237286,153600,C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\is-BR9NU.tmp\4_177039.exe"C:\Users\Admin\AppData\Local\Temp\is-BR9NU.tmp\4_177039.exe" /S /UID=lylal22011⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:5684 -
C:\Program Files\Common Files\WDJRNKTYTI\irecord.exe"C:\Program Files\Common Files\WDJRNKTYTI\irecord.exe" /VERYSILENT12⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\is-9MUK0.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-9MUK0.tmp\irecord.tmp" /SL5="$4037C,6139911,56832,C:\Program Files\Common Files\WDJRNKTYTI\irecord.exe" /VERYSILENT13⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5024 -
C:\Program Files (x86)\recording\i-record.exe"C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu14⤵
- Executes dropped EXE
PID:2764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\01-72240-dc9-59e92-46823f313d59f\Qaqojumilo.exe"C:\Users\Admin\AppData\Local\Temp\01-72240-dc9-59e92-46823f313d59f\Qaqojumilo.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\fd-04c90-38a-bae8a-b4de93c77266b\Jucepinymo.exe"C:\Users\Admin\AppData\Local\Temp\fd-04c90-38a-bae8a-b4de93c77266b\Jucepinymo.exe"12⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vnrdzlhb.3sw\001.exe & exit13⤵PID:5928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\vnrdzlhb.3sw\001.exeC:\Users\Admin\AppData\Local\Temp\vnrdzlhb.3sw\001.exe14⤵
- Executes dropped EXE
PID:5240
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nqpvt2r5.rm2\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:6288
-
C:\Users\Admin\AppData\Local\Temp\nqpvt2r5.rm2\installer.exeC:\Users\Admin\AppData\Local\Temp\nqpvt2r5.rm2\installer.exe /qn CAMPAIGN="654"14⤵
- Executes dropped EXE
PID:6644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lclrp0tp.pge\hbggg.exe & exit13⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\lclrp0tp.pge\hbggg.exeC:\Users\Admin\AppData\Local\Temp\lclrp0tp.pge\hbggg.exe14⤵
- Executes dropped EXE
PID:6240 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:5212
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:11136
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j5evbnkg.inf\google-game.exe & exit13⤵PID:8092
-
C:\Users\Admin\AppData\Local\Temp\j5evbnkg.inf\google-game.exeC:\Users\Admin\AppData\Local\Temp\j5evbnkg.inf\google-game.exe14⤵
- Checks computer location settings
PID:4452 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser15⤵PID:7528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 62416⤵
- Program crash
PID:7364
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\13ookql3.1pt\setup.exe & exit13⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\13ookql3.1pt\setup.exeC:\Users\Admin\AppData\Local\Temp\13ookql3.1pt\setup.exe14⤵PID:6660
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\13ookql3.1pt\setup.exe"15⤵PID:6512
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300016⤵
- Runs ping.exe
PID:7376
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1xiw44ue.zs4\customer1.exe & exit13⤵PID:7192
-
C:\Users\Admin\AppData\Local\Temp\1xiw44ue.zs4\customer1.exeC:\Users\Admin\AppData\Local\Temp\1xiw44ue.zs4\customer1.exe14⤵PID:6284
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:7888
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:11224
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4ay4qf15.x4y\toolspab1.exe & exit13⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\4ay4qf15.x4y\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\4ay4qf15.x4y\toolspab1.exe14⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\4ay4qf15.x4y\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\4ay4qf15.x4y\toolspab1.exe15⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7292
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wqnnuy5l.0mh\GcleanerWW.exe /mixone & exit13⤵PID:4564
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nsv1hn1m.evp\005.exe & exit13⤵PID:8184
-
C:\Users\Admin\AppData\Local\Temp\nsv1hn1m.evp\005.exeC:\Users\Admin\AppData\Local\Temp\nsv1hn1m.evp\005.exe14⤵PID:8180
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dmc1hq00.g0t\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\dmc1hq00.g0t\installer.exeC:\Users\Admin\AppData\Local\Temp\dmc1hq00.g0t\installer.exe /qn CAMPAIGN="654"14⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
PID:1288 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\dmc1hq00.g0t\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\dmc1hq00.g0t\ EXE_CMD_LINE="/forcecleanup /wintime 1621083818 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵PID:8668
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qvk4lmqr.35j\702564a0.exe & exit13⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\qvk4lmqr.35j\702564a0.exeC:\Users\Admin\AppData\Local\Temp\qvk4lmqr.35j\702564a0.exe14⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oombukgg.ezj\app.exe /8-2222 & exit13⤵PID:6452
-
C:\Users\Admin\AppData\Local\Temp\oombukgg.ezj\app.exeC:\Users\Admin\AppData\Local\Temp\oombukgg.ezj\app.exe /8-222214⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\oombukgg.ezj\app.exe"C:\Users\Admin\AppData\Local\Temp\oombukgg.ezj\app.exe" /8-222215⤵
- Modifies data under HKEY_USERS
PID:7692
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5wj52ktt.sjl\Setup3310.exe /Verysilent /subid=623 & exit13⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\5wj52ktt.sjl\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\5wj52ktt.sjl\Setup3310.exe /Verysilent /subid=62314⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\is-6ANJN.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-6ANJN.tmp\Setup3310.tmp" /SL5="$80414,138429,56832,C:\Users\Admin\AppData\Local\Temp\5wj52ktt.sjl\Setup3310.exe" /Verysilent /subid=62315⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\is-45DBB.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-45DBB.tmp\Setup.exe" /Verysilent16⤵
- Drops file in Program Files directory
PID:7012
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\askinstall38.exe"C:\Program Files (x86)\Data Finder\Versium Research\askinstall38.exe"9⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:4768
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Kills process with taskkill
PID:5516
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\Data Finder\Versium Research\jg7_7wjg.exe"9⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:1772
-
-
-
-
-
-
-
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2468
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:4604
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1904
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1412
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1356
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1268
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1080
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:936 -
C:\Users\Admin\AppData\Roaming\svdjtstC:\Users\Admin\AppData\Roaming\svdjtst2⤵
- Checks SCSI registry key(s)
PID:8932
-
-
C:\Users\Admin\AppData\Roaming\bcdjtstC:\Users\Admin\AppData\Roaming\bcdjtst2⤵
- Suspicious use of SetThreadContext
PID:10024 -
C:\Users\Admin\AppData\Roaming\bcdjtstC:\Users\Admin\AppData\Roaming\bcdjtst3⤵
- Checks SCSI registry key(s)
PID:4484
-
-
-
C:\Users\Admin\AppData\Roaming\bcdjtstC:\Users\Admin\AppData\Roaming\bcdjtst2⤵PID:9848
-
C:\Users\Admin\AppData\Roaming\bcdjtstC:\Users\Admin\AppData\Roaming\bcdjtst3⤵PID:6316
-
-
-
C:\Users\Admin\AppData\Roaming\svdjtstC:\Users\Admin\AppData\Roaming\svdjtst2⤵PID:9724
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:344
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3968
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4312
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4740
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7D241418D78C271C5AE768812741AAC4 C2⤵
- Loads dropped DLL
PID:5108
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5BB31879DECFB53D242558AFD7C464162⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5168 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:5500
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C7CDC69196E2FCB096E9E08D8AE0644E E Global\MSI00002⤵PID:6088
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 07FB2832C8AFC0B6AEB286C77FF678F4 C2⤵
- Loads dropped DLL
PID:4628
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B07D89926FCF23D224D8AFEB1F953E402⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:6088 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:4460
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 12FE28A4A9F5CE6F9FCF3D84BED1913C E Global\MSI00002⤵
- Loads dropped DLL
PID:2316
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 380C2AFAE4101F71BF3DBB72284E5493 C2⤵PID:6712
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A7CF009FB1CF39243525C01C54C432572⤵
- Blocklisted process makes network request
PID:8936 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:8924
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 80E0C310E7539ABF477234547045AADE E Global\MSI00002⤵PID:9960
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of WriteProcessMemory
PID:3432
-
C:\Users\Admin\AppData\Local\Temp\7688.exeC:\Users\Admin\AppData\Local\Temp\7688.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:5964 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $true2⤵PID:4304
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4344 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $true3⤵PID:4924
-
-
C:\Windows\System\spoolsv.exe"C:\Windows\System\spoolsv.exe" --MaxCircuitDirtiness 60 --NewCircuitPeriod 1 --MaxClientCircuitsPending 1024 --OptimisticData 1 --KeepalivePeriod 30 --CircuitBuildTimeout 10 --EnforceDistinctSubnets 0 --HardwareAccel 1 --UseEntryGuards 03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ADF.exeC:\Users\Admin\AppData\Local\Temp\7ADF.exe1⤵PID:5516
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\806E.exeC:\Users\Admin\AppData\Local\Temp\806E.exe1⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\8531.exeC:\Users\Admin\AppData\Local\Temp\8531.exe1⤵
- Executes dropped EXE
PID:3880
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4440
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4704
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5584
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4940
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4976
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4272
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4804
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4684
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4840
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6572
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6956
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:8064
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7756
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8592
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8864
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:8952
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:8432
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:8304
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7988
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Modifies data under HKEY_USERS
PID:4700
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2388
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4300 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4300 -s 12042⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3308
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3640
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4960
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1464
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4680
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4680 -s 19042⤵
- Program crash
PID:10308
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10416
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 10416 -s 12362⤵
- Program crash
PID:10492
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10576
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10848
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10764
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10944
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1