Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
01/02/2022, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe
Resource
win10v2004-en-20220112
General
-
Target
661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe
-
Size
1.2MB
-
MD5
37af7a672cde1b63aaf577f2e7f9794f
-
SHA1
5ad0add2e99f94f348b9b40c40bfec64bb132231
-
SHA256
661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d
-
SHA512
65b2a0949c59f0b00bef1cc74c14dee2317da39bf0a4ba4e5edfd223284b4a65c901220b7e405c22e09e6e8b3620c670c8587b681e533e36a5c8611cdba3244e
Malware Config
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Signatures
-
LockerGoga
LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office15\pkeyconfig-office.xrm-ms yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SONORA\SONORA.INF yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\JSByteCodeCache_64 yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-180.png yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\org-openide-util.jar yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\org-openide-modules.jar yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ul-oob.xrm-ms yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\es\msipc.dll.mui yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe yxugwjud4051.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html yxugwjud4051.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libmft_plugin.dll yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60_altform-unplated.png yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\currency.data yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\MSOSEC.XML yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IGX.DLL yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-200.png yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-remote.xml yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Light\Sunset.png yxugwjud4051.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\MSYHBD.TTC yxugwjud4051.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\libdirect3d11_filters_plugin.dll yxugwjud4051.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libyuy2_i420_plugin.dll yxugwjud4051.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\MANIFEST.MF yxugwjud4051.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\liblibass_plugin.dll yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-80.png yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\calendars.properties yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\zip.dll yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\eclipse.inf yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\AppxSignature.p7x yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Pay.Background.winmd yxugwjud4051.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jawt.dll yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-pl.xrm-ms yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\vi\msipc.dll.mui yxugwjud4051.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libx265_plugin.dll yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml.dll yxugwjud4051.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt yxugwjud4051.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\rt.jar yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jvm.lib yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\dropins\README.TXT yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_KMS_Client-ul-oob.xrm-ms yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Light\Paint3D.png yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-180.png yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Images\thumb_stats_render_smallest.png yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\accessibility.properties yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\MANIFEST.MF yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\msasxpress.dll yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Trial-ul-oob.xrm-ms yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\otkloadr_x64.dll yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Dark\Campfire.png yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\org-openide-util-lookup_zh_CN.jar yxugwjud4051.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\ECLIPSE_.SF yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial5-ppd.xrm-ms yxugwjud4051.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_wav_plugin.dll yxugwjud4051.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Dark\Silhouette.png yxugwjud4051.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jmx.xml yxugwjud4051.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-80.png yxugwjud4051.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3548 2444 WerFault.exe 36 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 564 yxugwjud4051.exe 564 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 2496 yxugwjud4051.exe 2496 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 2480 yxugwjud4051.exe 2480 yxugwjud4051.exe 564 yxugwjud4051.exe 564 yxugwjud4051.exe 3492 yxugwjud4051.exe 3492 yxugwjud4051.exe 772 yxugwjud4051.exe 772 yxugwjud4051.exe 772 yxugwjud4051.exe 772 yxugwjud4051.exe 772 yxugwjud4051.exe 772 yxugwjud4051.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3288 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe Token: SeBackupPrivilege 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe Token: SeRestorePrivilege 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe Token: SeLockMemoryPrivilege 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe Token: SeCreateGlobalPrivilege 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe Token: SeDebugPrivilege 2320 yxugwjud4051.exe Token: SeBackupPrivilege 2320 yxugwjud4051.exe Token: SeRestorePrivilege 2320 yxugwjud4051.exe Token: SeLockMemoryPrivilege 2320 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 2320 yxugwjud4051.exe Token: SeDebugPrivilege 2496 yxugwjud4051.exe Token: SeDebugPrivilege 3492 yxugwjud4051.exe Token: SeBackupPrivilege 2496 yxugwjud4051.exe Token: SeBackupPrivilege 3492 yxugwjud4051.exe Token: SeRestorePrivilege 2496 yxugwjud4051.exe Token: SeRestorePrivilege 3492 yxugwjud4051.exe Token: SeLockMemoryPrivilege 2496 yxugwjud4051.exe Token: SeLockMemoryPrivilege 3492 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 2496 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 3492 yxugwjud4051.exe Token: SeDebugPrivilege 2480 yxugwjud4051.exe Token: SeBackupPrivilege 2480 yxugwjud4051.exe Token: SeRestorePrivilege 2480 yxugwjud4051.exe Token: SeLockMemoryPrivilege 2480 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 2480 yxugwjud4051.exe Token: SeDebugPrivilege 564 yxugwjud4051.exe Token: SeBackupPrivilege 564 yxugwjud4051.exe Token: SeRestorePrivilege 564 yxugwjud4051.exe Token: SeLockMemoryPrivilege 564 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 564 yxugwjud4051.exe Token: SeDebugPrivilege 772 yxugwjud4051.exe Token: SeBackupPrivilege 772 yxugwjud4051.exe Token: SeRestorePrivilege 772 yxugwjud4051.exe Token: SeLockMemoryPrivilege 772 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 772 yxugwjud4051.exe Token: SeDebugPrivilege 3356 yxugwjud4051.exe Token: SeBackupPrivilege 3356 yxugwjud4051.exe Token: SeRestorePrivilege 3356 yxugwjud4051.exe Token: SeLockMemoryPrivilege 3356 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 3356 yxugwjud4051.exe Token: SeDebugPrivilege 4024 yxugwjud4051.exe Token: SeBackupPrivilege 4024 yxugwjud4051.exe Token: SeRestorePrivilege 4024 yxugwjud4051.exe Token: SeLockMemoryPrivilege 4024 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 4024 yxugwjud4051.exe Token: SeDebugPrivilege 3036 yxugwjud4051.exe Token: SeBackupPrivilege 3036 yxugwjud4051.exe Token: SeRestorePrivilege 3036 yxugwjud4051.exe Token: SeLockMemoryPrivilege 3036 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 3036 yxugwjud4051.exe Token: SeDebugPrivilege 2792 yxugwjud4051.exe Token: SeBackupPrivilege 2792 yxugwjud4051.exe Token: SeRestorePrivilege 2792 yxugwjud4051.exe Token: SeLockMemoryPrivilege 2792 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 2792 yxugwjud4051.exe Token: SeDebugPrivilege 2172 yxugwjud4051.exe Token: SeBackupPrivilege 2172 yxugwjud4051.exe Token: SeRestorePrivilege 2172 yxugwjud4051.exe Token: SeLockMemoryPrivilege 2172 yxugwjud4051.exe Token: SeCreateGlobalPrivilege 2172 yxugwjud4051.exe Token: SeDebugPrivilege 944 yxugwjud4051.exe Token: SeBackupPrivilege 944 yxugwjud4051.exe Token: SeRestorePrivilege 944 yxugwjud4051.exe Token: SeLockMemoryPrivilege 944 yxugwjud4051.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3820 wrote to memory of 3288 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe 59 PID 3820 wrote to memory of 3288 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe 59 PID 3820 wrote to memory of 2320 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe 61 PID 3820 wrote to memory of 2320 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe 61 PID 3820 wrote to memory of 2320 3820 661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe 61 PID 2320 wrote to memory of 2480 2320 yxugwjud4051.exe 62 PID 2320 wrote to memory of 2480 2320 yxugwjud4051.exe 62 PID 2320 wrote to memory of 2480 2320 yxugwjud4051.exe 62 PID 2320 wrote to memory of 2496 2320 yxugwjud4051.exe 65 PID 2320 wrote to memory of 2496 2320 yxugwjud4051.exe 65 PID 2320 wrote to memory of 2496 2320 yxugwjud4051.exe 65 PID 2320 wrote to memory of 564 2320 yxugwjud4051.exe 63 PID 2320 wrote to memory of 564 2320 yxugwjud4051.exe 63 PID 2320 wrote to memory of 564 2320 yxugwjud4051.exe 63 PID 2320 wrote to memory of 3492 2320 yxugwjud4051.exe 64 PID 2320 wrote to memory of 3492 2320 yxugwjud4051.exe 64 PID 2320 wrote to memory of 3492 2320 yxugwjud4051.exe 64 PID 2320 wrote to memory of 772 2320 yxugwjud4051.exe 68 PID 2320 wrote to memory of 772 2320 yxugwjud4051.exe 68 PID 2320 wrote to memory of 772 2320 yxugwjud4051.exe 68 PID 2320 wrote to memory of 3356 2320 yxugwjud4051.exe 69 PID 2320 wrote to memory of 3356 2320 yxugwjud4051.exe 69 PID 2320 wrote to memory of 3356 2320 yxugwjud4051.exe 69 PID 2320 wrote to memory of 4024 2320 yxugwjud4051.exe 70 PID 2320 wrote to memory of 4024 2320 yxugwjud4051.exe 70 PID 2320 wrote to memory of 4024 2320 yxugwjud4051.exe 70 PID 2320 wrote to memory of 3036 2320 yxugwjud4051.exe 72 PID 2320 wrote to memory of 3036 2320 yxugwjud4051.exe 72 PID 2320 wrote to memory of 3036 2320 yxugwjud4051.exe 72 PID 2320 wrote to memory of 2792 2320 yxugwjud4051.exe 73 PID 2320 wrote to memory of 2792 2320 yxugwjud4051.exe 73 PID 2320 wrote to memory of 2792 2320 yxugwjud4051.exe 73 PID 2320 wrote to memory of 2172 2320 yxugwjud4051.exe 74 PID 2320 wrote to memory of 2172 2320 yxugwjud4051.exe 74 PID 2320 wrote to memory of 2172 2320 yxugwjud4051.exe 74 PID 2320 wrote to memory of 944 2320 yxugwjud4051.exe 75 PID 2320 wrote to memory of 944 2320 yxugwjud4051.exe 75 PID 2320 wrote to memory of 944 2320 yxugwjud4051.exe 75 PID 2320 wrote to memory of 1344 2320 yxugwjud4051.exe 76 PID 2320 wrote to memory of 1344 2320 yxugwjud4051.exe 76 PID 2320 wrote to memory of 1344 2320 yxugwjud4051.exe 76 PID 2320 wrote to memory of 1232 2320 yxugwjud4051.exe 77 PID 2320 wrote to memory of 1232 2320 yxugwjud4051.exe 77 PID 2320 wrote to memory of 1232 2320 yxugwjud4051.exe 77 PID 2320 wrote to memory of 1856 2320 yxugwjud4051.exe 78 PID 2320 wrote to memory of 1856 2320 yxugwjud4051.exe 78 PID 2320 wrote to memory of 1856 2320 yxugwjud4051.exe 78 PID 2320 wrote to memory of 2688 2320 yxugwjud4051.exe 79 PID 2320 wrote to memory of 2688 2320 yxugwjud4051.exe 79 PID 2320 wrote to memory of 2688 2320 yxugwjud4051.exe 79 PID 2320 wrote to memory of 1396 2320 yxugwjud4051.exe 80 PID 2320 wrote to memory of 1396 2320 yxugwjud4051.exe 80 PID 2320 wrote to memory of 1396 2320 yxugwjud4051.exe 80 PID 2320 wrote to memory of 3148 2320 yxugwjud4051.exe 81 PID 2320 wrote to memory of 3148 2320 yxugwjud4051.exe 81 PID 2320 wrote to memory of 3148 2320 yxugwjud4051.exe 81 PID 2320 wrote to memory of 3112 2320 yxugwjud4051.exe 82 PID 2320 wrote to memory of 3112 2320 yxugwjud4051.exe 82 PID 2320 wrote to memory of 3112 2320 yxugwjud4051.exe 82 PID 2320 wrote to memory of 3852 2320 yxugwjud4051.exe 83 PID 2320 wrote to memory of 3852 2320 yxugwjud4051.exe 83 PID 2320 wrote to memory of 3852 2320 yxugwjud4051.exe 83 PID 2320 wrote to memory of 3648 2320 yxugwjud4051.exe 84 PID 2320 wrote to memory of 3648 2320 yxugwjud4051.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe"C:\Users\Admin\AppData\Local\Temp\661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c move /y C:\Users\Admin\AppData\Local\Temp\661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe2⤵
- Suspicious behavior: RenamesItself
PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -m2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵
- Drops file in Program Files directory
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exeC:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s3⤵PID:1016
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:344
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:2968
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 2444 -ip 24441⤵PID:1128
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2444 -s 58041⤵
- Program crash
PID:3548