Analysis
-
max time kernel
156s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01-02-2022 07:54
Static task
static1
Behavioral task
behavioral1
Sample
242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe
Resource
win10v2004-en-20220113
General
-
Target
242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe
-
Size
1.2MB
-
MD5
a93bd199d34d21cc9102600c6ce782cf
-
SHA1
31b50d84aa1af4f0e76a523382caba476f6e45dc
-
SHA256
242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95
-
SHA512
642e0cacf80a54ffa8f1bdeebb2a9b9449bb062bc331924ff8b6c93853ade68cdbd23928081d7c5da7bce944f5c553b0c4b05bd90fda525f017415bd891534c2
Malware Config
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
description ioc Process File created C:\Users\Admin\Downloads\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Users\Admin\Documents\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Notifications\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Extensions\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\locale\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\amd64\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Google\Chrome\Application\SetupMetrics\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jre1.8.0_66\lib\cmm\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Mozilla Firefox\browser\features\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS quE6wSrR64.exe -
Executes dropped EXE 52 IoCs
pid Process 4580 NWfQ50yE.exe 4380 quE6wSrR.exe 500 quE6wSrR64.exe 1280 quE6wSrR.exe 4056 quE6wSrR.exe 5008 quE6wSrR.exe 2064 quE6wSrR.exe 112 quE6wSrR.exe 3424 quE6wSrR.exe 1932 quE6wSrR.exe 5068 quE6wSrR.exe 2844 quE6wSrR.exe 4680 quE6wSrR.exe 2380 quE6wSrR.exe 4336 quE6wSrR.exe 2512 quE6wSrR.exe 4324 quE6wSrR.exe 3400 quE6wSrR.exe 1088 quE6wSrR.exe 400 quE6wSrR.exe 4624 quE6wSrR.exe 1412 quE6wSrR.exe 404 quE6wSrR.exe 5116 quE6wSrR.exe 368 quE6wSrR.exe 4020 quE6wSrR.exe 4652 quE6wSrR.exe 4184 quE6wSrR.exe 3064 quE6wSrR.exe 2108 quE6wSrR.exe 1764 quE6wSrR.exe 1956 quE6wSrR.exe 1928 quE6wSrR.exe 536 quE6wSrR.exe 2104 quE6wSrR.exe 2388 quE6wSrR.exe 4808 quE6wSrR.exe 2332 quE6wSrR.exe 64 quE6wSrR.exe 4040 quE6wSrR.exe 1204 quE6wSrR.exe 1636 quE6wSrR.exe 2644 quE6wSrR.exe 1328 quE6wSrR.exe 4208 quE6wSrR.exe 5060 quE6wSrR.exe 4164 quE6wSrR.exe 4608 quE6wSrR.exe 1048 quE6wSrR.exe 3172 quE6wSrR.exe 1056 quE6wSrR.exe 112 quE6wSrR.exe -
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000400000001e8cc-133.dat upx behavioral2/files/0x000400000001e8cc-134.dat upx behavioral2/files/0x000400000001e8cc-137.dat upx behavioral2/files/0x000400000001e8cc-139.dat upx behavioral2/files/0x000400000001e8cc-141.dat upx behavioral2/files/0x000400000001e8cc-142.dat upx behavioral2/files/0x000400000001e8cc-143.dat upx behavioral2/files/0x000400000001e8cc-144.dat upx behavioral2/files/0x000400000001e8cc-145.dat upx behavioral2/files/0x000400000001e8cc-146.dat upx behavioral2/files/0x000400000001e8cc-147.dat upx behavioral2/files/0x000400000001e8cc-148.dat upx behavioral2/files/0x000400000001e8cc-149.dat upx behavioral2/files/0x000400000001e8cc-150.dat upx behavioral2/files/0x000400000001e8cc-151.dat upx behavioral2/files/0x000400000001e8cc-152.dat upx behavioral2/files/0x000400000001e8cc-153.dat upx behavioral2/files/0x000400000001e8cc-154.dat upx behavioral2/files/0x000400000001e8cc-155.dat upx behavioral2/files/0x000400000001e8cc-156.dat upx behavioral2/files/0x000400000001e8cc-157.dat upx behavioral2/files/0x000400000001e8cc-158.dat upx behavioral2/files/0x000400000001e8cc-159.dat upx behavioral2/files/0x000400000001e8cc-160.dat upx behavioral2/files/0x000400000001e8cc-161.dat upx behavioral2/files/0x000400000001e8cc-162.dat upx behavioral2/files/0x000400000001e8cc-163.dat upx behavioral2/files/0x000400000001e8cc-164.dat upx behavioral2/files/0x000400000001e8cc-165.dat upx behavioral2/files/0x000400000001e8cc-166.dat upx behavioral2/files/0x000400000001e8cc-167.dat upx behavioral2/files/0x000400000001e8cc-168.dat upx behavioral2/files/0x000400000001e8cc-169.dat upx behavioral2/files/0x000400000001e8cc-170.dat upx behavioral2/files/0x000400000001e8cc-171.dat upx behavioral2/files/0x000400000001e8cc-172.dat upx behavioral2/files/0x000400000001e8cc-173.dat upx behavioral2/files/0x000400000001e8cc-174.dat upx behavioral2/files/0x000400000001e8cc-175.dat upx behavioral2/files/0x000400000001e8cc-176.dat upx behavioral2/files/0x000400000001e8cc-177.dat upx behavioral2/files/0x000400000001e8cc-178.dat upx behavioral2/files/0x000400000001e8cc-179.dat upx behavioral2/files/0x000400000001e8cc-180.dat upx behavioral2/files/0x000400000001e8cc-181.dat upx behavioral2/files/0x000400000001e8cc-182.dat upx behavioral2/files/0x000400000001e8cc-183.dat upx behavioral2/files/0x000400000001e8cc-184.dat upx behavioral2/files/0x000400000001e8cc-185.dat upx behavioral2/files/0x000400000001e8cc-186.dat upx behavioral2/files/0x000400000001e8cc-187.dat upx -
Modifies file permissions 1 TTPs 26 IoCs
pid Process 4892 takeown.exe 1468 takeown.exe 4572 takeown.exe 1780 takeown.exe 3912 takeown.exe 176 takeown.exe 1448 takeown.exe 3972 takeown.exe 1576 takeown.exe 2572 takeown.exe 820 takeown.exe 2644 takeown.exe 3792 takeown.exe 1040 takeown.exe 2304 takeown.exe 4132 takeown.exe 856 takeown.exe 3824 takeown.exe 1976 takeown.exe 4132 takeown.exe 2576 takeown.exe 4084 takeown.exe 3896 takeown.exe 4240 takeown.exe 4024 takeown.exe 3824 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\desktop.ini 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\desktop.ini 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: quE6wSrR64.exe File opened (read-only) \??\U: quE6wSrR64.exe File opened (read-only) \??\W: quE6wSrR64.exe File opened (read-only) \??\S: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\R: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\E: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\U: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\B: quE6wSrR64.exe File opened (read-only) \??\J: quE6wSrR64.exe File opened (read-only) \??\R: quE6wSrR64.exe File opened (read-only) \??\S: quE6wSrR64.exe File opened (read-only) \??\X: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\W: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\V: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\K: quE6wSrR64.exe File opened (read-only) \??\X: quE6wSrR64.exe File opened (read-only) \??\M: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\L: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\G: quE6wSrR64.exe File opened (read-only) \??\H: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\O: quE6wSrR64.exe File opened (read-only) \??\Y: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\Q: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\J: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\T: quE6wSrR64.exe File opened (read-only) \??\Y: quE6wSrR64.exe File opened (read-only) \??\Z: quE6wSrR64.exe File opened (read-only) \??\Z: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\T: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\P: quE6wSrR64.exe File opened (read-only) \??\M: quE6wSrR64.exe File opened (read-only) \??\V: quE6wSrR64.exe File opened (read-only) \??\K: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\I: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\H: quE6wSrR64.exe File opened (read-only) \??\E: quE6wSrR64.exe File opened (read-only) \??\L: quE6wSrR64.exe File opened (read-only) \??\P: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\N: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\F: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\F: quE6wSrR64.exe File opened (read-only) \??\N: quE6wSrR64.exe File opened (read-only) \??\Q: quE6wSrR64.exe File opened (read-only) \??\O: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\G: 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened (read-only) \??\A: quE6wSrR64.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\CYN1s9yh.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core-windows.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_it.properties 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-attach_ja.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_ja_4.4.0.v20140623020002.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\bg.pak 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\plugin.properties 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\java.policy 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluTSFrame.png 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.emf.ecore.xmi_2.10.1.v20140901-1043.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\fi.pak 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\sq.pak 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyoptionaltools.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.intro.nl_zh_4.4.0.v20140623020002.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_preferencestyle.css 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fonts\LucidaBrightDemiBold.ttf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\cy.pak 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.http.servlet_1.1.500.v20140318-1755.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.ja_5.5.0.165303.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.ui.nl_zh_4.4.0.v20140623020002.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\vlc.mo 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\ConvertFromSwitch.avi 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable_1.4.1.v20140210-1835.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\GetResize.mhtml 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\PYCC.pf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\vlc.mo 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\it.pak 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ru.pak 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\epl-v10.html 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-windows_ja.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\snmp.acl.template 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-lib-uihandler.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jvm_ja.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\VideoLAN\VLC\THANKS.txt 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\dblook.bat 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\localedata.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fonts\LucidaBrightDemiItalic.ttf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\sunec.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File created C:\Program Files\Java\jdk1.8.0_66\db\#README_EMAN#.rtf 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_zh_4.4.0.v20140623020002.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-outline_zh_CN.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\common.js 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets.nl_zh_4.4.0.v20140623020002.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\classlist 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist.json 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setEmbeddedCP 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.filesystem_1.4.100.v20140514-1614.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-tabcontrol_zh_CN.jar 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\vlc.mo 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_proxy\identity_helper.Sparse.Stable.msix 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 500 quE6wSrR64.exe 500 quE6wSrR64.exe 500 quE6wSrR64.exe 500 quE6wSrR64.exe 500 quE6wSrR64.exe 500 quE6wSrR64.exe 500 quE6wSrR64.exe 500 quE6wSrR64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 500 quE6wSrR64.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4572 takeown.exe Token: SeDebugPrivilege 500 quE6wSrR64.exe Token: SeLoadDriverPrivilege 500 quE6wSrR64.exe Token: SeTakeOwnershipPrivilege 3824 takeown.exe Token: SeTakeOwnershipPrivilege 1976 takeown.exe Token: SeTakeOwnershipPrivilege 3792 takeown.exe Token: SeTakeOwnershipPrivilege 1040 takeown.exe Token: SeTakeOwnershipPrivilege 1780 takeown.exe Token: SeTakeOwnershipPrivilege 3912 takeown.exe Token: SeTakeOwnershipPrivilege 176 takeown.exe Token: SeTakeOwnershipPrivilege 2576 takeown.exe Token: SeTakeOwnershipPrivilege 1448 takeown.exe Token: SeTakeOwnershipPrivilege 4084 takeown.exe Token: SeTakeOwnershipPrivilege 4240 takeown.exe Token: SeTakeOwnershipPrivilege 3896 takeown.exe Token: SeTakeOwnershipPrivilege 2304 takeown.exe Token: SeTakeOwnershipPrivilege 4132 takeown.exe Token: SeTakeOwnershipPrivilege 1576 takeown.exe Token: SeTakeOwnershipPrivilege 3972 takeown.exe Token: SeTakeOwnershipPrivilege 856 takeown.exe Token: SeTakeOwnershipPrivilege 4024 takeown.exe Token: SeTakeOwnershipPrivilege 4892 takeown.exe Token: SeTakeOwnershipPrivilege 2572 takeown.exe Token: SeTakeOwnershipPrivilege 1468 takeown.exe Token: SeTakeOwnershipPrivilege 3824 takeown.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3716 wrote to memory of 1840 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 83 PID 3716 wrote to memory of 1840 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 83 PID 3716 wrote to memory of 1840 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 83 PID 3716 wrote to memory of 4580 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 85 PID 3716 wrote to memory of 4580 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 85 PID 3716 wrote to memory of 4580 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 85 PID 3716 wrote to memory of 3240 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 92 PID 3716 wrote to memory of 3240 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 92 PID 3716 wrote to memory of 3240 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 92 PID 3716 wrote to memory of 1272 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 93 PID 3716 wrote to memory of 1272 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 93 PID 3716 wrote to memory of 1272 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 93 PID 3240 wrote to memory of 1608 3240 cmd.exe 96 PID 3240 wrote to memory of 1608 3240 cmd.exe 96 PID 3240 wrote to memory of 1608 3240 cmd.exe 96 PID 3716 wrote to memory of 2272 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 97 PID 3716 wrote to memory of 2272 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 97 PID 3716 wrote to memory of 2272 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 97 PID 1272 wrote to memory of 4616 1272 cmd.exe 99 PID 1272 wrote to memory of 4616 1272 cmd.exe 99 PID 1272 wrote to memory of 4616 1272 cmd.exe 99 PID 3240 wrote to memory of 2388 3240 cmd.exe 100 PID 3240 wrote to memory of 2388 3240 cmd.exe 100 PID 3240 wrote to memory of 2388 3240 cmd.exe 100 PID 3240 wrote to memory of 4808 3240 cmd.exe 101 PID 3240 wrote to memory of 4808 3240 cmd.exe 101 PID 3240 wrote to memory of 4808 3240 cmd.exe 101 PID 2272 wrote to memory of 4904 2272 cmd.exe 102 PID 2272 wrote to memory of 4904 2272 cmd.exe 102 PID 2272 wrote to memory of 4904 2272 cmd.exe 102 PID 2272 wrote to memory of 4572 2272 cmd.exe 103 PID 2272 wrote to memory of 4572 2272 cmd.exe 103 PID 2272 wrote to memory of 4572 2272 cmd.exe 103 PID 2272 wrote to memory of 612 2272 cmd.exe 104 PID 2272 wrote to memory of 612 2272 cmd.exe 104 PID 2272 wrote to memory of 612 2272 cmd.exe 104 PID 612 wrote to memory of 4380 612 cmd.exe 105 PID 612 wrote to memory of 4380 612 cmd.exe 105 PID 612 wrote to memory of 4380 612 cmd.exe 105 PID 3716 wrote to memory of 4460 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 107 PID 3716 wrote to memory of 4460 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 107 PID 3716 wrote to memory of 4460 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 107 PID 4460 wrote to memory of 2912 4460 cmd.exe 109 PID 4460 wrote to memory of 2912 4460 cmd.exe 109 PID 4460 wrote to memory of 2912 4460 cmd.exe 109 PID 4380 wrote to memory of 500 4380 quE6wSrR.exe 110 PID 4380 wrote to memory of 500 4380 quE6wSrR.exe 110 PID 4460 wrote to memory of 820 4460 cmd.exe 111 PID 4460 wrote to memory of 820 4460 cmd.exe 111 PID 4460 wrote to memory of 820 4460 cmd.exe 111 PID 4460 wrote to memory of 4040 4460 cmd.exe 112 PID 4460 wrote to memory of 4040 4460 cmd.exe 112 PID 4460 wrote to memory of 4040 4460 cmd.exe 112 PID 4040 wrote to memory of 1280 4040 cmd.exe 113 PID 4040 wrote to memory of 1280 4040 cmd.exe 113 PID 4040 wrote to memory of 1280 4040 cmd.exe 113 PID 4460 wrote to memory of 4056 4460 cmd.exe 114 PID 4460 wrote to memory of 4056 4460 cmd.exe 114 PID 4460 wrote to memory of 4056 4460 cmd.exe 114 PID 3716 wrote to memory of 4716 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 115 PID 3716 wrote to memory of 4716 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 115 PID 3716 wrote to memory of 4716 3716 242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe 115 PID 4716 wrote to memory of 1508 4716 cmd.exe 117 PID 4716 wrote to memory of 1508 4716 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe"C:\Users\Admin\AppData\Local\Temp\242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe"1⤵
- Matrix Ransomware
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\242713ef2f372f0d39ca8f01bd09c9f99bcfe850e156621c023dd9e0bfb9bd95.exe" "C:\Users\Admin\AppData\Local\Temp\NWfQ50yE.exe"2⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\NWfQ50yE.exe"C:\Users\Admin\AppData\Local\Temp\NWfQ50yE.exe" -n2⤵
- Executes dropped EXE
PID:4580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\CYN1s9yh.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\CYN1s9yh.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:1608
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:2388
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\qpJECGpw.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\qpJECGpw.vbs"3⤵PID:4616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\ProgramData\USOPrivate\UpdateStore\store.db""2⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cacls.execacls "C:\ProgramData\USOPrivate\UpdateStore\store.db" /E /G Admin:F /C3⤵PID:4904
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\ProgramData\USOPrivate\UpdateStore\store.db"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "store.db" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "store.db" -nobanner4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\quE6wSrR64.exequE6wSrR.exe -accepteula "store.db" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Users\All Users\USOPrivate\UpdateStore\store.db""2⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\USOPrivate\UpdateStore\store.db" /E /G Admin:F /C3⤵PID:2912
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\USOPrivate\UpdateStore\store.db"3⤵
- Modifies file permissions
PID:820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "store.db" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "store.db" -nobanner4⤵
- Executes dropped EXE
PID:1280
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa""2⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa" /E /G Admin:F /C3⤵PID:1508
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa"3⤵
- Modifies file permissions
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "classes.jsa" -nobanner3⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "classes.jsa" -nobanner4⤵
- Executes dropped EXE
PID:5008
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:2064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\de-DE\PhotoAcq.dll.mui""2⤵PID:3488
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\de-DE\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:4256
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\de-DE\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:112
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\fr-FR\PhotoViewer.dll.mui""2⤵PID:2804
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\fr-FR\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:2952
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\fr-FR\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Security\BrowserCore\manifest.json""2⤵PID:4676
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Security\BrowserCore\manifest.json" /E /G Admin:F /C3⤵PID:2260
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Security\BrowserCore\manifest.json"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "manifest.json" -nobanner3⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "manifest.json" -nobanner4⤵
- Executes dropped EXE
PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Java\jre1.8.0_66\bin\server\classes.jsa""2⤵PID:3100
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Java\jre1.8.0_66\bin\server\classes.jsa" /E /G Admin:F /C3⤵PID:2712
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Java\jre1.8.0_66\bin\server\classes.jsa"3⤵
- Modifies file permissions
PID:4132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "classes.jsa" -nobanner3⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "classes.jsa" -nobanner4⤵
- Executes dropped EXE
PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\de-DE\ImagingDevices.exe.mui""2⤵PID:3916
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\de-DE\ImagingDevices.exe.mui" /E /G Admin:F /C3⤵PID:1576
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\de-DE\ImagingDevices.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner3⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\fr-FR\PhotoAcq.dll.mui""2⤵PID:3068
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\fr-FR\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:5000
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\fr-FR\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:3400
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui""2⤵PID:1028
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui" /E /G Admin:F /C3⤵PID:856
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "BrowserCore.exe.mui" -nobanner3⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "BrowserCore.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:400
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui""2⤵PID:2100
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:2756
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:1412
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\it-IT\PhotoViewer.dll.mui""2⤵PID:984
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\it-IT\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:4332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\it-IT\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:5116
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\de-DE\PhotoViewer.dll.mui""2⤵PID:4864
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\de-DE\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:2432
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\de-DE\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\ImagingDevices.exe""2⤵PID:4632
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\ImagingDevices.exe" /E /G Admin:F /C3⤵PID:1220
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\ImagingDevices.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "ImagingDevices.exe" -nobanner3⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "ImagingDevices.exe" -nobanner4⤵
- Executes dropped EXE
PID:4184
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Mail\wabmig.exe""2⤵PID:3760
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Mail\wabmig.exe" /E /G Admin:F /C3⤵PID:2032
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Mail\wabmig.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "wabmig.exe" -nobanner3⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "wabmig.exe" -nobanner4⤵
- Executes dropped EXE
PID:2108
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\fr-FR\ImagingDevices.exe.mui""2⤵PID:4944
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\fr-FR\ImagingDevices.exe.mui" /E /G Admin:F /C3⤵PID:3424
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\fr-FR\ImagingDevices.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner3⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe""2⤵PID:3216
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe" /E /G Admin:F /C3⤵PID:3728
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "BrowserCore.exe" -nobanner3⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "BrowserCore.exe" -nobanner4⤵
- Executes dropped EXE
PID:536
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui""2⤵PID:4676
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui" /E /G Admin:F /C3⤵PID:2712
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner3⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\es-ES\PhotoAcq.dll.mui""2⤵PID:1888
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\es-ES\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:444
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\es-ES\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:2332
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:64
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\it-IT\ImagingDevices.exe.mui""2⤵PID:4196
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\it-IT\ImagingDevices.exe.mui" /E /G Admin:F /C3⤵PID:1348
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\it-IT\ImagingDevices.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner3⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "ImagingDevices.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:4040
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:1204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\ja-JP\PhotoAcq.dll.mui""2⤵PID:4356
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\ja-JP\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:1508
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\ja-JP\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Mail\wab.exe""2⤵PID:5012
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Mail\wab.exe" /E /G Admin:F /C3⤵PID:176
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Mail\wab.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "wab.exe" -nobanner3⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "wab.exe" -nobanner4⤵
- Executes dropped EXE
PID:1328
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\es-ES\PhotoViewer.dll.mui""2⤵PID:3000
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\es-ES\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:2576
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\es-ES\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui""2⤵PID:4384
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:1448
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:4608
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui""2⤵PID:1296
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:4084
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\87nz0VJc.bat" "C:\Program Files\Windows Photo Viewer\ja-JP\PhotoViewer.dll.mui""2⤵PID:4560
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\ja-JP\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:2796
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\ja-JP\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c quE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\quE6wSrR.exequE6wSrR.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:112
-
-
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 75ce6a99f3a6d3c01fd75538d49a86f9 YduDj5TrIUWz4U/3pjPoQA.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:4748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:4708