Malware Analysis Report

2024-10-18 23:00

Sample ID 220211-h2552adhgk
Target 012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03
SHA256 012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03
Tags
globeimposter persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03

Threat Level: Known bad

The file 012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03 was found to be: Known bad.

Malicious Activity Summary

globeimposter persistence ransomware spyware stealer

GlobeImposter

Modifies extensions of user files

Reads user/profile data of web browsers

Adds Run key to start application

Drops desktop.ini file(s)

Drops file in Windows directory

Checks processor information in registry

Modifies data under HKEY_USERS

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-02-11 07:14

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-02-11 07:14

Reported

2022-02-11 07:33

Platform

win7-en-20211208

Max time kernel

160s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe"

Signatures

GlobeImposter

ransomware globeimposter

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\ConvertToAssert.png => C:\Users\Admin\Pictures\ConvertToAssert.png.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\OpenGrant.crw => C:\Users\Admin\Pictures\OpenGrant.crw.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe" C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe

"C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe"

Network

N/A

Files

memory/1904-55-0x0000000076731000-0x0000000076733000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-02-11 07:14

Reported

2022-02-11 07:33

Platform

win10v2004-en-20220112

Max time kernel

166s

Max time network

183s

Command Line

"C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe"

Signatures

GlobeImposter

ransomware globeimposter

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\ClearStart.crw => C:\Users\Admin\Pictures\ClearStart.crw.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\GroupWatch.png => C:\Users\Admin\Pictures\GroupWatch.png.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\HideJoin.tif => C:\Users\Admin\Pictures\HideJoin.tif.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\JoinStart.crw => C:\Users\Admin\Pictures\JoinStart.crw.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\OpenCheckpoint.raw => C:\Users\Admin\Pictures\OpenCheckpoint.raw.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\RepairEnter.tif => C:\Users\Admin\Pictures\RepairEnter.tif.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\ResetRead.tif => C:\Users\Admin\Pictures\ResetRead.tif.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File renamed C:\Users\Admin\Pictures\StartConvertFrom.tif => C:\Users\Admin\Pictures\StartConvertFrom.tif.czlock C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe" C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat C:\Windows\System32\svchost.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\system32\MusNotifyIcon.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\system32\MusNotifyIcon.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132892147967048055" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.599992" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" C:\Windows\System32\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" C:\Windows\System32\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4040" C:\Windows\System32\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" C:\Windows\System32\svchost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe

"C:\Users\Admin\AppData\Local\Temp\012ac236929976d1e6767fe02f0f9b6c53dbfef4e1e73f8d00ee6f831498fc03.exe"

C:\Windows\system32\MusNotifyIcon.exe

%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k NetworkService -p

Network

Country Destination Domain Proto
US 8.8.8.8:53 geo.prod.do.dsp.mp.microsoft.com udp
US 52.184.216.174:443 geo.prod.do.dsp.mp.microsoft.com tcp
US 8.8.8.8:53 kv801.prod.do.dsp.mp.microsoft.com udp
NL 184.29.205.60:443 kv801.prod.do.dsp.mp.microsoft.com tcp
US 204.79.197.200:443 tcp

Files

N/A