Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
328s -
max time network
323s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 19:05
Static task
static1
General
-
Target
6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.exe
-
Size
3.2MB
-
MD5
32e0a8e898a4aef3abe2c5c26d2570fb
-
SHA1
0c56076f2d4d905a08dc2e8c85a6fd4d184a0846
-
SHA256
6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3
-
SHA512
1cec6e1dd8eaea6bfc00c48403d3263db6a54d4012b87666da5ac2f83748ef9102ed97c026e185d3c8cc0342c8feafd0a27442dfc19d6d37b69a9d91168ab97d
-
SSDEEP
98304:kSiH4opH4opH4opuE9vBuRes1EdKKBEXJhJj:EDBDBDlaezKKB2R
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\lnkfile\shellex\DragDropHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip\ = "{E0D79305-84BE-11CE-9641-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip\ = "{E0D79305-84BE-11CE-9641-444553540000}" winzip64.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 31 IoCs
pid Process 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 1996 CheatEngine74.exe 2840 CheatEngine74.tmp 2836 _setup64.tmp 3552 Kernelmoduleunloader.exe 2060 windowsrepair.exe 1668 saBSI.exe 3860 winzip27-dci5.exe 1852 winzip27-dci5.exe 1220 saBSI.exe 1316 installer.exe 5084 installer.exe 1336 CloseFAH.exe 2840 ServiceHost.exe 1184 UIHost.exe 4732 updater.exe 5084 WzPreviewer64.exe 3196 WzPreloader.exe 3560 winzip64.exe 4928 WzCABCacheSyncHelper64.exe 620 WzBGTComServer64.exe 4168 FAHConsole.exe 3808 FAHWindow64.exe 4888 adxregistrator.exe 4956 adxregistrator.exe 472 WZUpdateNotifier.exe 620 WzBGTComServer64.exe 720 WzBGTools64.exe 860 Cheat Engine.exe 2372 cheatengine-x86_64-SSE4-AVX2.exe 1736 Tutorial-i386.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "C:\\Program Files\\WinZip\\adxloader64.WinZipExpressForOffice.dll" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Key deleted \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CA9DBE8-C0B1-42c9-B6C7-856BE5756855}\LocalServer32\ = "\"C:\\Program Files\\WinZip\\WzBGTComServer64.exe\"" WzBGTComServer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32 winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\wzshls64.dll" MsiExec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CC15BB9-FB90-4D43-BE2D-8FC05F1A454C}\InProcServer32\InprocServer32 = 440030003200420039003200430041004200300035003000410031003500300034004600320037003600440036003600000034006b00480038004800730024006a0049003d00270045006600280049007a00500069005a004700450043004400430036003e004d0035004b0044005900530055006e0066002800480041002a004c005b00780065005800290079002400660031002c004200460079004000580039002d00410045007d0026004d003500500025005900500072006f006700720061006d005f0044006100740061003e004d0035004b0044005900530055006e0066002800480041002a004c005b007800650058002900790000000000 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CA9DBE8-C0B1-42c9-B6C7-856BE5756855}\LocalServer32 WzBGTComServer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{784C04A3-2E5A-4E7C-A7F7-7D97E27859AD}\LocalServer32\ = "C:\\Program Files\\WinZip\\winzip64.exe" winzip64.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{784C04A3-2E5A-4E7C-A7F7-7D97E27859AD}\LocalServer32 winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" winzip64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\WSSDep.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32 winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Apartment" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\wzshls64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32\ = "C:\\Program Files\\WinZip\\wzshls64.dll" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "C:\\Program Files\\WinZip\\adxloader.WinZipExpressForOffice.dll" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Apartment" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, PublicKeyToken=86E07F6D9D2175EE" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D7930A-84BE-11CE-9641-444553540002}\LocalServer32\ThreadingModel = "Apartment" WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\InProcServer32 winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, PublicKeyToken=86E07F6D9D2175EE" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Class = "WinZipExpressForOffice.AddinModule" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79306-84BE-11CE-9641-444553540000}\InProcServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, PublicKeyToken=86E07F6D9D2175EE" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32\ThreadingModel = "Apartment" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9CC15BB9-FB90-4D43-BE2D-8FC05F1A454C}\InProcServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79305-84BE-11CE-9641-444553540000}\InProcServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\Assembly = "WinZipExpressForOffice, Version=3.5.15230.0, Culture=neutral, PublicKeyToken=86e07f6d9d2175ee" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\InProcServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation winzip27-dci5.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation UIHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Cheat Engine.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cheatengine-x86_64-SSE4-AVX2.exe -
Loads dropped DLL 64 IoCs
pid Process 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 3896 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 4684 regsvr32.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1456 regsvr32.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 2396 regsvr32.exe 1856 MsiExec.exe 1052 regsvr32.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 228 MsiExec.exe 2840 ServiceHost.exe 1184 UIHost.exe 1184 UIHost.exe 2840 ServiceHost.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3168 icacls.exe 3776 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinZip UN = "\"C:\\Program Files\\WinZip\\WZUpdateNotifier.exe\" -show" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinZip FAH = "C:\\Program Files\\WinZip\\FAHConsole.exe" msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: winzip27-dci5.exe File opened (read-only) \??\L: winzip27-dci5.exe File opened (read-only) \??\M: winzip27-dci5.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: winzip27-dci5.exe File opened (read-only) \??\U: winzip27-dci5.exe File opened (read-only) \??\Y: winzip27-dci5.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: winzip27-dci5.exe File opened (read-only) \??\N: winzip27-dci5.exe File opened (read-only) \??\X: winzip27-dci5.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: winzip27-dci5.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: winzip27-dci5.exe File opened (read-only) \??\W: winzip27-dci5.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: winzip27-dci5.exe File opened (read-only) \??\J: winzip27-dci5.exe File opened (read-only) \??\R: winzip27-dci5.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: winzip27-dci5.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: winzip27-dci5.exe File opened (read-only) \??\S: winzip27-dci5.exe File opened (read-only) \??\T: winzip27-dci5.exe File opened (read-only) \??\Z: winzip27-dci5.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: winzip27-dci5.exe File opened (read-only) \??\O: winzip27-dci5.exe File opened (read-only) \??\P: winzip27-dci5.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: winzip27-dci5.exe -
Drops file in System32 directory 56 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_450FB595A2B94F541FA38043D90DDD68 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F winzip64.exe File opened for modification C:\Windows\System32\imagehlp.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA winzip64.exe File opened for modification C:\Windows\System32\imm32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\user32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\KERNEL32.DLL cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\uxtheme.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\Wldp.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F winzip64.exe File opened for modification C:\Windows\System32\RPCRT4.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\advapi32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\windows.storage.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA winzip64.exe File opened for modification C:\Windows\System32\bcryptPrimitives.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ucrtbase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 winzip64.exe File opened for modification C:\Windows\System32\combase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shlwapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\comdlg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\opengl32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wininet.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 winzip64.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\GDI32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcrt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\sechost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ws2_32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\win32u.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\version.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\MSCTF.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA winzip64.exe File opened for modification C:\Windows\System32\gdi32full.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shell32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA winzip64.exe File opened for modification C:\Windows\System32\KERNELBASE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\oleaut32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ole32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\psapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\explorerframe.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 winzip64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 winzip64.exe File opened for modification C:\Windows\system32\shfolder.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_450FB595A2B94F541FA38043D90DDD68 winzip64.exe File opened for modification C:\Windows\System32\msvcp_win.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\clbcatq.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\profapi.dll cheatengine-x86_64-SSE4-AVX2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\commonlogicloader.luc WzPreviewer64.exe File opened for modification C:\Program Files\WinZip\winzip.gid winzip64.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\switch_off.png WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-sstoast-bing.html WzPreviewer64.exe File opened for modification C:\Program Files\McAfee\Temp3538778587\jslang\wa-res-install-fr-FR.js installer.exe File created C:\Program Files\WinZip\WzWXFfbsm64.dll msiexec.exe File opened for modification C:\Program Files\Cheat Engine 7.4\Cheat Engine.exe CheatEngine74.tmp File created C:\Program Files\Cheat Engine 7.4\autorun\ceshare\is-QUBBC.tmp CheatEngine74.tmp File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\context\analyticscontextconfig.luc WzPreviewer64.exe File opened for modification C:\Program Files\McAfee\Temp3538778587\jslang\wa-res-install-cs-CZ.js installer.exe File created C:\Program Files\WinZip\WzWpfCldPicker64.dll msiexec.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-overlay-de-DE.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-zh-CN.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-ru-RU.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ext-install-toast-fr-CA.js WzPreviewer64.exe File opened for modification C:\Program Files\McAfee\Temp3538778587\browserhost.cab installer.exe File created C:\Program Files\McAfee\Temp3538778587\jslang\wa-res-shared-ko-KR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\mwb\stop-video-alert-icon.png WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\webadvisor.ico installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ext-install-toast-ru-RU.js WzPreviewer64.exe File created C:\Program Files\McAfee\Temp3538778587\icon_laptop.png installer.exe File created C:\Program Files\McAfee\Temp3538778587\installer.exe installer.exe File created C:\Program Files\WinZip\adxregistrator.exe msiexec.exe File created C:\Program Files\Cheat Engine 7.4\badassets\is-Q6RP1.tmp CheatEngine74.tmp File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-bing-zh-TW.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-sv-SE.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\version.luc WzPreviewer64.exe File created C:\Program Files\Cheat Engine 7.4\is-I8PKQ.tmp CheatEngine74.tmp File created C:\Program Files\McAfee\Temp3538778587\jslang\wa-res-shared-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-oem-ss-toast-variants-ru-RU.js WzPreviewer64.exe File created C:\Program Files\WinZip\IPP.dll msiexec.exe File created C:\Program Files\McAfee\Temp3538778587\jslang\wa-res-install-fi-FI.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-ss-toast-variants.js WzPreviewer64.exe File opened for modification C:\Program Files\McAfee\Temp3538778587\wa_install_check2.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-sstoast-toggle.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-sk-SK.js WzPreviewer64.exe File created C:\Program Files\WinZip\WzBGTWin10Notification.dll msiexec.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-fr-FR.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-webboost-pt-PT.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-webboost-ja-JP.js WzPreviewer64.exe File opened for modification C:\Program Files\McAfee\Temp3538778587\jslang\eula-fr-CA.txt installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\utils\stringutils.luc WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-sr-Latn-CS.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-pscore-toast-zh-TW.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\toastchecktriggered.luc WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-sr-Latn-CS.js WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\events\analyticseventsconfig.luc WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\events\dailyping.luc WzPreviewer64.exe File created C:\Program Files\Cheat Engine 7.4\include\is-C90CS.tmp CheatEngine74.tmp File created C:\Program Files\McAfee\WebAdvisor\MFW\core\uiarbitratorhelper.luc WzPreviewer64.exe File created C:\Program Files\WinZip\en-US\CloudStoragePicker.resources.dll msiexec.exe File created C:\Program Files\WinZip\adxloader64.WinZipExpressForOffice.dll msiexec.exe File created C:\Program Files\McAfee\Temp3538778587\mcafee_pc_install_icon.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\logic\oem_utils\oem_util_selector.luc installer.exe File created C:\Program Files\WinZip\DupFFStub.exe msiexec.exe File created C:\Program Files\Cheat Engine 7.4\autorun\is-PC4P1.tmp CheatEngine74.tmp File created C:\Program Files\McAfee\Temp3538778587\l10n.cab installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages_web_view\webadvisor\wa-options.html WzPreviewer64.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-pps-tr-TR.js WzPreviewer64.exe File created C:\Program Files\WinZip\en-US\WinZip.gif msiexec.exe File created C:\Program Files\Cheat Engine 7.4\plugins\is-BLDIA.tmp CheatEngine74.tmp File created C:\Program Files\McAfee\Temp3538778587\updater.cab installer.exe File created C:\Program Files\McAfee\Temp3538778587\jslang\wa-res-shared-pt-BR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\defaultbrowser.luc WzPreviewer64.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI935C.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ImgUtil64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI3598.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI38D7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5D37.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8DFE.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_MenuGroup.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_StartMenu.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\Sbkup64_ShortCut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI30CE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3665.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI440F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9306.tmp msiexec.exe File opened for modification C:\Windows\win.ini winzip64.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_Preloader.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIC551.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI935B.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\DupFFStub64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\DupFFStub64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIB610.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI302D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI33EE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9316.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9349.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB75A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBE42.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\DupFF64_Shortcut_StartMenu.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ImgUtilStub64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI2FCC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3ADC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3D82.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI92E3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4391.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB2BF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB5C1.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ARPPRODUCTICON.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_MenuGroup.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ImgUtilStub64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SbkupStub64_ShortCut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI303E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI304E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3B89.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB2BE.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_Preloader.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI342E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3DB1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI92F4.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\ImgUtil64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIB7BA.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\PdfUtil64_Shortcut_Desktop.exe msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SafeShare64_ShortCut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI2FFC.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{CD95F661-A5C4-44F5-A6AA-ECDD91C24143} msiexec.exe File opened for modification C:\Windows\Installer\MSIB1D2.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\Sbkup64_ShortCut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI2F5E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI300D.tmp msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\SafeShare64_ShortCut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIC28C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC1FE.tmp msiexec.exe File opened for modification C:\Windows\Installer\e572c8e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB7A9.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C24143}\WinZip64_Shortcut_StartMenu.exe msiexec.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4124 sc.exe 1532 sc.exe 3848 sc.exe 4208 sc.exe 2204 sc.exe 1848 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3496 schtasks.exe 3732 schtasks.exe 2472 schtasks.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "124" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "111" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1154" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1154" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1225" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "814" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "2340" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\NumberOfSubdomains = "1" winzip27-dci5.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "0" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "51" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "814" winzip27-dci5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION MsiExec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "2340" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "814" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "1857" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1857" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1225" winzip27-dci5.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\corel.com winzip27-dci5.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "51" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1154" winzip27-dci5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\winzip64.exe = "8000" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\WebAuthBroker.exe = "10000" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage winzip27-dci5.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "51" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "111" winzip27-dci5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "1225" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "124" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "1857" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "124" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "0" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\corel.com\Total = "111" winzip27-dci5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ipm.corel.com\ = "2340" winzip27-dci5.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Corel\PCU winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.BHX = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\Wizard = "0" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\GridLines = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFgdrv\Default winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\Col_Path = "10,L,-2,F" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFlc WzCABCacheSyncHelper64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\PowerPoint\AddIns\WinZipExpressForOffice.AddinModule\CommandLineSafe = "0" adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ServiceHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\Common\Email\Share\WinZip winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\CheckOutIconOnly = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.TXZ = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\Col_Date = "4,L,120,T" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\Uninstall\ClassName.ZIP = "CompressedFolder" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFfbsm WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\IBS = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\wzshlext\AddToFolder = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\WinZip Computing\WinZip Computing = "Please look in the Nico Mak Computing section for WinZip keys, values, and settings." winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\wzshlext\MenuCfgTable = "222222222222222222222222222221" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFdbox\Default winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFlf WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Corel\WinZip\Subs winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.HQX = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.IMG = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFtt WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\x-at = "dci5" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\ListFormat1 = "4" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\winzip winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\Statistics winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFoned winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.RAR = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\caution\ErrDelEncrytCaution = "0" winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\Common\Update Notifier\UpdtMgr000\ProductState = "1" winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" adxregistrator.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Word\AddIns\WinZipExpressForOffice.AddinModule\FriendlyName = "WinZipExpressForOffice" adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFbox\Default\MaxUploadSizeMB = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFcldme\Default winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\LastDPI = "100" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFrmpd WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFytb WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\FullRowSelect = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Word adxregistrator.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFoned\Default\MaxUploadSizeMB = "0" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\caution\ErrDelFileCaution = "0" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\Col_Path = "10,L, -1,F" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software adxregistrator.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wzcloud\shell\Open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\DupFFDesktopIcon = "DupFF" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\EnterpriseCloudFeature = "Complete" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.XX\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F}\ = "{E0D7930A-84BE-11CE-9641-444553540002}" WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.JobFile\shell\open winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.img\ShellNew msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.VHD\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RAR\WinZip\ShellNew msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ZIPX\shell\Open\command msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F}\ = "{E0D7930A-84BE-11CE-9641-444553540002}" WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.Theme\shell\open\command\ = "\"C:\\Program Files\\WinZip\\winzip64.exe\" /installtheme \"%1\"" winzip64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\166F59DC4C5A5F446AAACEDD192C1434\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D7930A-84BE-11CE-9641-444553540002}\DisplayName = "@C:\\Program Files\\WinZip\\WzPreviewer64.exe,-201" WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\CloudSvcFiles = "CloudSvc" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\166F59DC4C5A5F446AAACEDD192C1434\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\DownloadScan.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.TXZ\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.SetupConfig winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinZip winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\166F59DC4C5A5F446AAACEDD192C1434 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vhd\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F}\ = "{E0D7930A-84BE-11CE-9641-444553540002}" WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ImageManager\shell\open\ = "Open with WinZip &Image Manager" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0D79304-84BE-11CE-9641-444553540000} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.BZ2\WinZip\ShellNew msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32 adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.TXZ WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rar msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\ProgId adxregistrator.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\166F59DC4C5A5F446AAACEDD192C1434\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip\shellex\{8895B1C6-B41F-4C1C-A562-0D564250836F} winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ZipX\shell\open\command\ = "\"C:\\Program Files\\WinZip\\winzip64.exe\" \"%1\"" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\MediaFireCloudEnglishFiles = "MediaFireCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\SUWC = "WinZip" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\SocialMediaEnglishFiles = "SocialMedia" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.JobFile\shell\open\ = "Run with &WinZip" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.JobFile\shell\edit winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C1434\AllOtherFiles = "MainGUI" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.TBZ\ShellEx WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip\shell\open\ = "Open with &WinZip" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\ = "C:\\Program Files\\WinZip\\adxloader64.WinZipExpressForOffice.dll" adxregistrator.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\166F59DC4C5A5F446AAACEDD192C1434\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\WNZP\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.TAZ\ShellEx WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zipx\ShellEx\{00021500-0000-0000-c000-000000000046}\ = "{E0D79307-84BE-11CE-9641-444553540000}" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0D79307-84BE-11CE-9641-444553540000}\ = "WinZip" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cab\ = "WinZip" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.TAZ\ = "WinZip" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.RegFile\shell\ = "open" winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.PdfExpress\shell winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.iso\ShellNew msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\InprocServer32\3.5.15230.0\CodeBase = "file:///C:/Program Files/WinZip/WinZipExpressForOffice.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220}\ = "{4BA250A6-8BCA-46A6-982A-F340081187C3}" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\AppUserModelID = "WinZipComputing.WinZip64" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0D79304-84BE-11CE-9641-444553540000}\InProcServer32 winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.swjf\ = "WinZip.SecureBackup" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vmdk msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.JobFile\shell\open\command\ = "\"C:\\Program Files\\WinZip\\winzip64.exe\" /runjobfile \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zipx\WinZip.ZIPX\ShellNew msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.gz\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c000000010000000400000000100000190000000100000010000000ffac207997bb2cfe865570179ee037b9030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e199604000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 0f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e42000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e ServiceHost.exe -
Runs net.exe
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 111 Cheat Engine 7.4 : luascript-ceshare -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2840 CheatEngine74.tmp 2840 CheatEngine74.tmp 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1668 saBSI.exe 1220 saBSI.exe 1220 saBSI.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1856 MsiExec.exe 1336 CloseFAH.exe 1336 CloseFAH.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 2840 ServiceHost.exe 1184 UIHost.exe 1184 UIHost.exe 1184 UIHost.exe 1184 UIHost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2824 Explorer.EXE 2372 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 420 msiexec.exe Token: SeCreateTokenPrivilege 1852 winzip27-dci5.exe Token: SeAssignPrimaryTokenPrivilege 1852 winzip27-dci5.exe Token: SeLockMemoryPrivilege 1852 winzip27-dci5.exe Token: SeIncreaseQuotaPrivilege 1852 winzip27-dci5.exe Token: SeMachineAccountPrivilege 1852 winzip27-dci5.exe Token: SeTcbPrivilege 1852 winzip27-dci5.exe Token: SeSecurityPrivilege 1852 winzip27-dci5.exe Token: SeTakeOwnershipPrivilege 1852 winzip27-dci5.exe Token: SeLoadDriverPrivilege 1852 winzip27-dci5.exe Token: SeSystemProfilePrivilege 1852 winzip27-dci5.exe Token: SeSystemtimePrivilege 1852 winzip27-dci5.exe Token: SeProfSingleProcessPrivilege 1852 winzip27-dci5.exe Token: SeIncBasePriorityPrivilege 1852 winzip27-dci5.exe Token: SeCreatePagefilePrivilege 1852 winzip27-dci5.exe Token: SeCreatePermanentPrivilege 1852 winzip27-dci5.exe Token: SeBackupPrivilege 1852 winzip27-dci5.exe Token: SeRestorePrivilege 1852 winzip27-dci5.exe Token: SeShutdownPrivilege 1852 winzip27-dci5.exe Token: SeDebugPrivilege 1852 winzip27-dci5.exe Token: SeAuditPrivilege 1852 winzip27-dci5.exe Token: SeSystemEnvironmentPrivilege 1852 winzip27-dci5.exe Token: SeChangeNotifyPrivilege 1852 winzip27-dci5.exe Token: SeRemoteShutdownPrivilege 1852 winzip27-dci5.exe Token: SeUndockPrivilege 1852 winzip27-dci5.exe Token: SeSyncAgentPrivilege 1852 winzip27-dci5.exe Token: SeEnableDelegationPrivilege 1852 winzip27-dci5.exe Token: SeManageVolumePrivilege 1852 winzip27-dci5.exe Token: SeImpersonatePrivilege 1852 winzip27-dci5.exe Token: SeCreateGlobalPrivilege 1852 winzip27-dci5.exe Token: SeShutdownPrivilege 1852 winzip27-dci5.exe Token: SeIncreaseQuotaPrivilege 1852 winzip27-dci5.exe Token: SeCreateTokenPrivilege 1852 winzip27-dci5.exe Token: SeAssignPrimaryTokenPrivilege 1852 winzip27-dci5.exe Token: SeLockMemoryPrivilege 1852 winzip27-dci5.exe Token: SeIncreaseQuotaPrivilege 1852 winzip27-dci5.exe Token: SeMachineAccountPrivilege 1852 winzip27-dci5.exe Token: SeTcbPrivilege 1852 winzip27-dci5.exe Token: SeSecurityPrivilege 1852 winzip27-dci5.exe Token: SeTakeOwnershipPrivilege 1852 winzip27-dci5.exe Token: SeLoadDriverPrivilege 1852 winzip27-dci5.exe Token: SeSystemProfilePrivilege 1852 winzip27-dci5.exe Token: SeSystemtimePrivilege 1852 winzip27-dci5.exe Token: SeProfSingleProcessPrivilege 1852 winzip27-dci5.exe Token: SeIncBasePriorityPrivilege 1852 winzip27-dci5.exe Token: SeCreatePagefilePrivilege 1852 winzip27-dci5.exe Token: SeCreatePermanentPrivilege 1852 winzip27-dci5.exe Token: SeBackupPrivilege 1852 winzip27-dci5.exe Token: SeRestorePrivilege 1852 winzip27-dci5.exe Token: SeShutdownPrivilege 1852 winzip27-dci5.exe Token: SeDebugPrivilege 1852 winzip27-dci5.exe Token: SeAuditPrivilege 1852 winzip27-dci5.exe Token: SeSystemEnvironmentPrivilege 1852 winzip27-dci5.exe Token: SeChangeNotifyPrivilege 1852 winzip27-dci5.exe Token: SeRemoteShutdownPrivilege 1852 winzip27-dci5.exe Token: SeUndockPrivilege 1852 winzip27-dci5.exe Token: SeSyncAgentPrivilege 1852 winzip27-dci5.exe Token: SeEnableDelegationPrivilege 1852 winzip27-dci5.exe Token: SeManageVolumePrivilege 1852 winzip27-dci5.exe Token: SeImpersonatePrivilege 1852 winzip27-dci5.exe Token: SeCreateGlobalPrivilege 1852 winzip27-dci5.exe Token: SeRestorePrivilege 420 msiexec.exe Token: SeTakeOwnershipPrivilege 420 msiexec.exe Token: SeRestorePrivilege 420 msiexec.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 2840 CheatEngine74.tmp 3560 winzip64.exe 2824 Explorer.EXE 2824 Explorer.EXE 2824 Explorer.EXE 2824 Explorer.EXE 2372 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2824 Explorer.EXE 2824 Explorer.EXE 2824 Explorer.EXE -
Suspicious use of SetWindowsHookAW 1 IoCs
pid Process 3560 winzip64.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 1852 winzip27-dci5.exe 1852 winzip27-dci5.exe 1852 winzip27-dci5.exe 3560 winzip64.exe 3560 winzip64.exe 3560 winzip64.exe 3560 winzip64.exe 3560 winzip64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4200 2112 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.exe 80 PID 2112 wrote to memory of 4200 2112 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.exe 80 PID 2112 wrote to memory of 4200 2112 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.exe 80 PID 4200 wrote to memory of 1996 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 88 PID 4200 wrote to memory of 1996 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 88 PID 4200 wrote to memory of 1996 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 88 PID 1996 wrote to memory of 2840 1996 CheatEngine74.exe 89 PID 1996 wrote to memory of 2840 1996 CheatEngine74.exe 89 PID 1996 wrote to memory of 2840 1996 CheatEngine74.exe 89 PID 2840 wrote to memory of 3172 2840 CheatEngine74.tmp 91 PID 2840 wrote to memory of 3172 2840 CheatEngine74.tmp 91 PID 3172 wrote to memory of 2736 3172 net.exe 92 PID 3172 wrote to memory of 2736 3172 net.exe 92 PID 2840 wrote to memory of 1740 2840 CheatEngine74.tmp 93 PID 2840 wrote to memory of 1740 2840 CheatEngine74.tmp 93 PID 1740 wrote to memory of 224 1740 net.exe 95 PID 1740 wrote to memory of 224 1740 net.exe 95 PID 2840 wrote to memory of 1532 2840 CheatEngine74.tmp 96 PID 2840 wrote to memory of 1532 2840 CheatEngine74.tmp 96 PID 2840 wrote to memory of 3848 2840 CheatEngine74.tmp 98 PID 2840 wrote to memory of 3848 2840 CheatEngine74.tmp 98 PID 2840 wrote to memory of 2836 2840 CheatEngine74.tmp 100 PID 2840 wrote to memory of 2836 2840 CheatEngine74.tmp 100 PID 2840 wrote to memory of 3168 2840 CheatEngine74.tmp 102 PID 2840 wrote to memory of 3168 2840 CheatEngine74.tmp 102 PID 2840 wrote to memory of 3552 2840 CheatEngine74.tmp 105 PID 2840 wrote to memory of 3552 2840 CheatEngine74.tmp 105 PID 2840 wrote to memory of 3552 2840 CheatEngine74.tmp 105 PID 2840 wrote to memory of 2060 2840 CheatEngine74.tmp 107 PID 2840 wrote to memory of 2060 2840 CheatEngine74.tmp 107 PID 2840 wrote to memory of 2060 2840 CheatEngine74.tmp 107 PID 2840 wrote to memory of 3776 2840 CheatEngine74.tmp 108 PID 2840 wrote to memory of 3776 2840 CheatEngine74.tmp 108 PID 4200 wrote to memory of 1668 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 110 PID 4200 wrote to memory of 1668 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 110 PID 4200 wrote to memory of 1668 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 110 PID 4200 wrote to memory of 3860 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 111 PID 4200 wrote to memory of 3860 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 111 PID 4200 wrote to memory of 3860 4200 6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp 111 PID 3860 wrote to memory of 1852 3860 winzip27-dci5.exe 112 PID 3860 wrote to memory of 1852 3860 winzip27-dci5.exe 112 PID 3860 wrote to memory of 1852 3860 winzip27-dci5.exe 112 PID 1668 wrote to memory of 1220 1668 saBSI.exe 113 PID 1668 wrote to memory of 1220 1668 saBSI.exe 113 PID 1668 wrote to memory of 1220 1668 saBSI.exe 113 PID 420 wrote to memory of 3896 420 msiexec.exe 118 PID 420 wrote to memory of 3896 420 msiexec.exe 118 PID 420 wrote to memory of 3896 420 msiexec.exe 118 PID 420 wrote to memory of 1856 420 msiexec.exe 119 PID 420 wrote to memory of 1856 420 msiexec.exe 119 PID 1220 wrote to memory of 1316 1220 saBSI.exe 120 PID 1220 wrote to memory of 1316 1220 saBSI.exe 120 PID 1316 wrote to memory of 5084 1316 installer.exe 121 PID 1316 wrote to memory of 5084 1316 installer.exe 121 PID 1856 wrote to memory of 1336 1856 MsiExec.exe 122 PID 1856 wrote to memory of 1336 1856 MsiExec.exe 122 PID 1856 wrote to memory of 1336 1856 MsiExec.exe 122 PID 5084 wrote to memory of 4208 5084 installer.exe 125 PID 5084 wrote to memory of 4208 5084 installer.exe 125 PID 5084 wrote to memory of 4128 5084 WzPreviewer64.exe 124 PID 5084 wrote to memory of 4128 5084 WzPreviewer64.exe 124 PID 4128 wrote to memory of 4684 4128 regsvr32.exe 127 PID 4128 wrote to memory of 4684 4128 regsvr32.exe 127 PID 4128 wrote to memory of 4684 4128 regsvr32.exe 127
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.exe"C:\Users\Admin\AppData\Local\Temp\6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\is-BOP8V.tmp\6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp"C:\Users\Admin\AppData\Local\Temp\is-BOP8V.tmp\6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp" /SL5="$90042,2408085,845312,C:\Users\Admin\AppData\Local\Temp\6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\CheatEngine74.exe"C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\CheatEngine74.exe" /VERYSILENT /ZBDIST4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\is-J0I2H.tmp\CheatEngine74.tmp"C:\Users\Admin\AppData\Local\Temp\is-J0I2H.tmp\CheatEngine74.tmp" /SL5="$701F2,23492458,780800,C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\CheatEngine74.exe" /VERYSILENT /ZBDIST5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAntic6⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAntic7⤵PID:2736
-
-
-
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAnticheat6⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAnticheat7⤵PID:224
-
-
-
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAntic6⤵
- Launches sc.exe
PID:1532
-
-
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAnticheat6⤵
- Launches sc.exe
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\is-NJ883.tmp\_isetup\_setup64.tmphelper 105 0x45C6⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.4" /grant *S-1-15-2-1:(OI)(CI)(RX)6⤵
- Modifies file permissions
PID:3168
-
-
C:\Program Files\Cheat Engine 7.4\Kernelmoduleunloader.exe"C:\Program Files\Cheat Engine 7.4\Kernelmoduleunloader.exe" /SETUP6⤵
- Executes dropped EXE
PID:3552
-
-
C:\Program Files\Cheat Engine 7.4\windowsrepair.exe"C:\Program Files\Cheat Engine 7.4\windowsrepair.exe" /s6⤵
- Executes dropped EXE
PID:2060
-
-
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.4" /grant *S-1-15-2-1:(OI)(CI)(RX)6⤵
- Modifies file permissions
PID:3776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\prod0_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\prod0_extract\saBSI.exe" /affid 91088 PaidDistribution=true4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\ProgramData\McAfee\WebAdvisor\saBSI\saBSI.exe"C:\ProgramData\McAfee\WebAdvisor\saBSI\saBSI.exe" /install /affid 91088 PaidDistribution=true saBsiVersion=4.1.1.663 /no_self_update5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\ProgramData\McAfee\WebAdvisor\saBSI\installer.exe"C:\ProgramData\McAfee\WebAdvisor\saBSI\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files\McAfee\Temp3538778587\installer.exe"C:\Program Files\McAfee\Temp3538778587\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"8⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"9⤵
- Loads dropped DLL
PID:4684
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"8⤵
- Launches sc.exe
PID:4208
-
-
C:\Windows\SYSTEM32\sc.exesc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"8⤵
- Launches sc.exe
PID:2204
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"8⤵
- Registers COM server for autorun
- Loads dropped DLL
PID:1456
-
-
C:\Windows\SYSTEM32\sc.exesc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//08⤵
- Launches sc.exe
PID:1848
-
-
C:\Windows\SYSTEM32\sc.exesc.exe start "McAfee WebAdvisor"8⤵
- Launches sc.exe
PID:4124
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"8⤵PID:2624
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"9⤵
- Loads dropped DLL
PID:2396
-
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"8⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:1052
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\prod1_extract\winzip27-dci5.exe"C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\prod1_extract\winzip27-dci5.exe" /qn4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\e56f5fd\winzip27-dci5.exe/qn run=1 shortcut="C:\Users\Admin\AppData\Local\Temp\is-FRTCF.tmp\prod1_extract\winzip27-dci5.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
-
C:\Program Files\Cheat Engine 7.4\Cheat Engine.exe"C:\Program Files\Cheat Engine 7.4\Cheat Engine.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
PID:860 -
C:\Program Files\Cheat Engine 7.4\cheatengine-x86_64-SSE4-AVX2.exe"C:\Program Files\Cheat Engine 7.4\cheatengine-x86_64-SSE4-AVX2.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2372 -
C:\Program Files\Cheat Engine 7.4\Tutorial-i386.exe"C:\Program Files\Cheat Engine 7.4\Tutorial-i386.exe"6⤵
- Executes dropped EXE
PID:1736
-
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2D9E7572CFFDE8DB78B9B9AA1B8D3AA42⤵
- Loads dropped DLL
PID:3896
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 77FB0ED9D5CC53DDB64D8F65CA75E4502⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe"C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files\WinZip\adxregistrator.exe"C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=user /GenerateLogFile=false3⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:4888
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 1" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_9AM\" -show" /ST 09:50 /F3⤵
- Creates scheduled task(s)
PID:3732
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 2" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_12PM\" -show" /ST 12:50 /F3⤵
- Creates scheduled task(s)
PID:2472
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 3" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_3PM\" -show" /ST 15:50 /F3⤵
- Creates scheduled task(s)
PID:3496
-
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding EE35D25C82CCFAC3D78F463C1F435648 E Global\MSI00002⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
PID:228 -
C:\Program Files\WinZip\FAHConsole.exe"C:\Program Files\WinZip\FAHConsole.exe"3⤵
- Executes dropped EXE
PID:4168 -
C:\Program Files\WinZip\FAHWindow64.exe"C:\Program Files\WinZip\FAHWindow64.exe" register4⤵
- Executes dropped EXE
PID:3808
-
-
-
C:\Program Files\WinZip\adxregistrator.exe"C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=admin /GenerateLogFile=false3⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4956
-
-
-
C:\Program Files\WinZip\WzPreviewer64.exe"C:\Program Files\WinZip\WzPreviewer64.exe" -regserver winzip642⤵
- Executes dropped EXE
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5084
-
-
C:\Program Files\WinZip\WzPreloader.exe"C:\Program Files\WinZip\WzPreloader.exe"2⤵
- Executes dropped EXE
PID:3196
-
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" /noqp /nodesktop /nostartmenu /nomenugroup /autoinstall /lang 10332⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Registers COM server for autorun
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
PID:3560 -
C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4928
-
-
-
C:\Program Files\WinZip\WzUpdater.exe"C:\Program Files\WinZip\WzUpdater.exe" /schedule2⤵PID:620
-
-
C:\Program Files\WinZip\WZUpdateNotifier.exe"C:\Program Files\WinZip\WZUpdateNotifier.exe"2⤵
- Executes dropped EXE
PID:472
-
-
C:\Program Files\WinZip\WzBGTComServer64.exe"C:\Program Files\WinZip\WzBGTComServer64.exe" /REGSERVER2⤵
- Executes dropped EXE
- Registers COM server for autorun
PID:620
-
-
C:\Program Files\WinZip\WzBGTools64.exe"C:\Program Files\WinZip\WzBGTools64.exe" /s2⤵
- Executes dropped EXE
PID:720
-
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Program Files\McAfee\WebAdvisor\updater.exe"C:\Program Files\McAfee\WebAdvisor\updater.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"3⤵PID:4656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )3⤵PID:4440
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Install Root Certificate
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD50fa859e1b115bb88ea35bf65077e97af
SHA175f2f3e46b059f5f4bfefb62970e6c6a9c91075f
SHA25637bb7ba2590773884017988b6a0eb3ebb1a24f2add9781805af98699d3d0c50a
SHA51231956e2c7bd08dd5804b3267f58336881fbdabe8b778c63d4a8d7a144b08465560d755838638ea46cd5378a1e97ca85ba3d56d5dafe0445c27dd97e8d26b4761
-
Filesize
222KB
MD5747e651d3ebb87e7dea87a2e7a9a9221
SHA12e35bb45f6e3275b3a4b7cf135cbba6c3ef6df68
SHA2567f980a29a73510af39b199aebd6caa42e5b28ea781a7eb040d6d33e213267cfc
SHA512311b3fd46155757fb8d1359e3a92bed40fa5b3868d0ee1e8db299bc565052a5e17e947ce9b9bce8357bb5449486d6ab34f0f9920a62a319fc21e9b7ec4e0f1bf
-
Filesize
328KB
MD519d52868c3e0b609dbeb68ef81f381a9
SHA1ce365bd4cf627a3849d7277bafbf2f5f56f496dc
SHA256b96469b310ba59d1db320a337b3a8104db232a4344a47a8e5ae72f16cc7b1ff4
SHA5125fbd53d761695de1dd6f0afd0964b33863764c89692345cab013c0b1b6332c24dcf766028f305cc87d864d17229d7a52bf19a299ca136a799053c368f21c8926
-
Filesize
468KB
MD5daa81711ad1f1b1f8d96dc926d502484
SHA17130b241e23bede2b1f812d95fdb4ed5eecadbfd
SHA2568422be70e0ec59c962b35acf8ad80671bcc8330c9256e6e1ec5c07691388cd66
SHA5129eaa8e04ad7359a30d5e2f9256f94c1643d4c3f3c0dff24d6cd9e31a6f88cb3b470dd98f01f8b0f57bb947adc3d45c35749ed4877c7cbbbcc181145f0c361065
-
Filesize
1KB
MD53e20f1013fb48a67fe59bede7b8e341b
SHA18c8a4cb49c3b29db2c47f84aafd0416101722bfe
SHA25696e4429192f9ab26f8bf9f9429f36b388aa69c3624781c61ea6df7e1bca9b49b
SHA51299cf3f88c8b06da0dbe8085dee796bec7a9533990a55fbce7524a4f941b5ecf0e8ec975a4b032eb2aaabd116c0804995a75036c98a5e4058f25d78d08a11f3f2
-
Filesize
9KB
MD540d6bfe593194cf938e19622a3c13a5e
SHA1761257e8ef492431cf0e04dbca396fabb25fe1ae
SHA256c4cef60489b067c8e7abcdd5594643a27d0720b21523753dd462d53024287116
SHA5121d1aaa9de74b0bb08cc4ceced5dbfa4c589347eac098d7ae013d5a1beaae0eeaca4d314e2591560c6df14a93dd4e9316ca317d21efadcca57d11eee72f4c6e16
-
Filesize
7KB
MD5e76fcd2ecd5b956d4579a676aa3eea01
SHA149ecba5ccc531a40ad7805a126d38b44b4a36576
SHA2560339ba0043af5c058cf3a19de9f90312d18f6bb2728f454ef403b531bd57ae42
SHA5128443c213d4a626a358631f76a0cc4c106543ce58c94d34a96b88574b3e32ae742f28878b259a17823ca07ec521b06e32e572e7bc77e10951bc0984b07c0571c6
-
Filesize
13KB
MD526c0e56abebfb550a9d208d6191816e0
SHA18f2392846633ac48a0168afe9f20afc124699f4c
SHA256a825f660df2e6c13dbece0a0f8dc306129bd784f8dc4efc37e67e9cdd00ce65f
SHA5124fc8a18e2f24374953694cb9230d9ddba7a1b69b3ba5574ae143cb79b8d0f7cd94e9dd7337ec58ea40769a4b552a583c466781ac7eff50c9199eab39ad2076a9
-
Filesize
6KB
MD50b5180bd64689788ebeaa8e705a264ac
SHA143a5cc401ee6c4ff4a94697112b1bc1d4345fc19
SHA2568fd38a5e6c0408ca77e0e7a0ee179b4391758ec6da94ea289e3a2cbc1ab1ec59
SHA512cc26e2e36b93bf89aa16c744b2db60d855de616db7a67f4fb24135545104459338c3edeab42bb316b1ecb0db9e31970b1415a1bf638ea3e53ae31471330aeadb
-
Filesize
3KB
MD50d4d1b597712015ef1b0ec8adc26495f
SHA13584779c06619f545b47a27703aa2f47455d50de
SHA25689c8fccc16d2aa0a3004dc1b477a5c1dcbba539769b2a4558f7c7d9b9809b133
SHA512ae26bbb2c3f74c143a01ec3b296a26699c679d51bc68c8c7b8c460616d1a0aa065500ebca83e972a720bd7a3c5a7b63a673eaecef1391a2e717208ef8da0796f
-
Filesize
12KB
MD5665bb2e55e2a13157d1dbfef05d1b905
SHA1408fea33f574bd0fa9e4cb71958363398e0699bc
SHA256da6ecce3db7d305813ffe80ca994663d43f1068f0fb67399a4c66d1f28684bfa
SHA5128fe95e22680e1e802d0ceeecbbd6b098526468b8cf4d838301d2833247d94e4f3b3a4b76a68f9faaa2177b42ff2ffea2df46ef56a4a0ce501d126135ce8ee985
-
Filesize
3KB
MD565c8d4eddfe05267a72eae3ddb2cf02a
SHA1eef2928d355c8b669f8854da37162ba1fe32740a
SHA25615b0c7682e5e8d2e2c2b8cb00c0c03b7dfa9439ac80c37f8e96a4f86652246f9
SHA5121c151d5a44482362430fbc6ed4550671ad96e768942e4ec2a4c487182bed9d0326a0d40a1ac43f2c8a3de1e18e33b055ce7126d80fee9b5b7091ed83a22a41ad
-
Filesize
9KB
MD5607a7c1ab93026d94916f21779d0d645
SHA13d5a64b256fc44086e6e190ea0bc45b5999e1979
SHA256ea61eea6289c2feba7b7d0cc24db5277e383102f24784e6bf7254af41829599c
SHA512d6749e2dbe46466a1cb1c464ce3f237836ef6b572ef897c7f5c9d12f80a6c0c7a5dfea54c3499a91e14b29c8bbf0809cce433c379f9e5dc0072e436f641c59ad
-
Filesize
20KB
MD587cd08b16891e0dbe3d47bb71ca91691
SHA155d98338b4aa0df3566cd2e721b3d3f86a3836aa
SHA2566bfd35aa64ab566ddb68d0675ad3b4a093649010a9c30df3a30a7f9dc2ed7702
SHA512847becf1d3066a3e185001035b68496b91876bdeb323734782c41fc9b2bdf665bf33c728cebbe78e820654d87b1969c09b5d1faed7498538cb5f761984108614
-
Filesize
24KB
MD5623b89f1e13c54a1f560b254317948b5
SHA1b90e2de7a5cff0b14738f2fb4f6a3a4e1ee1a17c
SHA2560c6e90c2525f1560acea3f4bdae056d11df1c2f675c2335594dc80bb910a1b17
SHA512f80cd50f860a5f8d5c6d6ab7ba8691b443da91573f3f0fc8d5b82b79556c5ac02accc610870ea61a886ecb8a4491457965d082f8f41df781ded1db84f7157a3f
-
Filesize
5KB
MD56cf99831e2aaafb97e975eae06a705ff
SHA1b6e71f7d3c779575598b65a6e4fb341344a3ddd2
SHA256e9d57acb17502ac169deb37f211e472f68cd6e8a69e071d384b989fa45e9fa7f
SHA512f6467c4c9dcab563dbb5a337c76616208d1a1058d704b222e616e5a0809a156b1a29198919f4bf0d40c55a6e972439722c02aac8a156c53572b6d7ef80986405
-
Filesize
8KB
MD5d4f5fe5a2f5feeb3d97b2fdf4ae7e6bc
SHA1eef59c5a8aacd86f993e2bb3f8e5892817a9f7eb
SHA2569cb25c63ab41be2ba3984df20686dd27bf937e029ebfaa56ebe88bac6dfc53b6
SHA512b00e9467a5203b04a958a69b20152ad5907e5337a43e3ff8f9209a01d7874dd477bb8596e93b3acaf7354ee7ce76e742f4a72f598473a9c8cc36bbdbb240bb43
-
Filesize
1KB
MD5cd4d7aee15163ab407b4f18d8f93dcc3
SHA1676e3eea53646f221dcb4c9b7dcc2cb5315f36bc
SHA256d8de8120c14da094feddb24c46c3e729d99696ccce9c2d479797ffbbf34bd20b
SHA51217ede3db62a9d2abfb8d2715e5ed816a7badf1eb7ead79e5b48ab6db7dcd8215b40cdd03d4a3cfd5ede4567fa5092d9f7406fb25bc82dcaa26cbea57c2207f69
-
Filesize
1KB
MD523cc858da49a7bda9e9fe3abf8d86d1d
SHA19d869496104acfff0c5cb572628085666dc53486
SHA256d5786540891c411bc34a5505a6cee0e747df2e5cd410abfeb94e6d4169c85069
SHA512b5650ab1ae463f97f5681dd3fdff7015c963703a7437ac5f71a158f3e0bdc045e69151897d0ec75aa9dd4ccac5475e6e492ce46a296bcab8c4c329720e3c002a
-
Filesize
1KB
MD57ffd1e1b425636cfa08cda89429c69a6
SHA1ec6a75fca2bc4f2e8cb7ab9644d1bedb1d686221
SHA25644e9bc08a3f919da8689c4703e77324568f3902e95f8f3f92ccf234bcf7bf649
SHA512dba72b7a8f1a3d72101e4f735e0cea1be8e72236a81e6fc2ce18e7f93715b5c1f21aa384790c7e0097a23aeb6d52e954ce7c7adf7c6189a855dcd6fadade7c9b
-
Filesize
2KB
MD5d6fcb383a27920083054dd42003bec4d
SHA13941a986929680d50b8b74e61323d1d6c20aec27
SHA256a8611471651393e17090167c5b6cade46eae9fee8841db0816bf36a4f43fbe16
SHA512405cbb3823344bc321e135c8084710352506a342ff22a2c356b0629eb6e929ac44c0098bd6e90256bc0814a7693d367e6e4aea8bf277b122654e19a185d52938
-
Filesize
936B
MD55ad30685c039c115c346d24223c3eae4
SHA1814c5b02040e87906e7a64f4355b8a35101bdacf
SHA256bd3e07decc17007796403191246ab0f3585f51532fbf16d496e541c3107d7e0e
SHA512de29c279573c7cc542e8a9ac427594e067d47de390a7d41ac2e7ccddd646550b5ed6d2ecae39b2c7b798649b6d61ba5bd259fd0a8814d35b508d3ae96dd19bc1
-
Filesize
1KB
MD50212208fd406500388f08bc4189cc57e
SHA179a82f1ac86d6c4be3c3e4b0a790bfd4e2f6b27e
SHA256a85170d26b9344dca793c3b2326ec709d2f2d01578e78b855e82b14795b0025c
SHA51233e7e2ae0b3d36d8e909cffc993e6b36923e8775e780832f5d689c15d04712ea412b62cc709c53128d9acad34f1922cb9fee90304da2f879bebeb4f3a67b9523
-
Filesize
49KB
MD5b02fa5c8eefbcd010aaac97a94ff62bb
SHA1fd88f2fc529515252cbcab507f322b080853c38b
SHA2567bd0d77fd790215bb67337f9f210b05aaab0193d105b8ff86ec422e9875eb033
SHA5121d18cb2cffbf83ef949c2a34fa28c4e011c623c62ce743c7f320db1acfbd41bea2ea6d3f0d93a34874973fc43367d6562c630f8b7912b22be7ccc61851001a18
-
Filesize
60KB
MD5cefc5c56720ca850ccb20faf47733bd2
SHA155f25cf4a7de12607b085e8cfdba0383f0207e9d
SHA256f107dd69b4115864d289f364fafc0e045fd3e9fc4bde5586ce8c1bcf59cc65a7
SHA5121b6fba56feac4f4345b2f6ced82a3dddacc3c0cb6f49c1d30105a8156b8de851e34b9e31478c658c60d907c9f26237d2efb7c2ab85adb49905fdcca6349a4dee
-
Filesize
37KB
MD5deecc45bc05d00a36e0793b4f1b15b73
SHA1e504bebdb8e8ad6298c0c694aaac7915a4c1ff6d
SHA256672c7d08ec97139e886b4ab32cfe5b2c3b0f49e7651f1ca881583d8b03b2206b
SHA512044f5d05d46262b926cf68faa60b9c9e991c3986a102a92097a5fa272833e3cc6b9c79a88fec4c512cb8df95981afde195ed1825bc38996575dc3c6bf55147fb
-
Filesize
379KB
MD5fd176c8f13eb31e348771e5cec3a83c4
SHA1a4c8c76bfa931f9e804964d9d92bf65f16f55604
SHA2562a33eb24b091e19fa8d16d11205f8300303831ace6de19e5b8f8980589ff075d
SHA512a8aa5c981f4768d40fad2bc7400b8e84f4f8cf362619847ccb25fad73498839e8f240d97fd40b9546f1782ea5d48f83d800213c7b53c600904fd090fa01dfd7a
-
Filesize
509KB
MD54161fd506386d51d62cf0d71c57adf40
SHA1e43b18449992183434e9e3e2eb6e7eb3974577bb
SHA2568d2b4e7251fa504ac6b4f21336af8988009a828467db6fe896fbb99a3f43f8a8
SHA512ed6eaaed2798376cd25f93bc26368e6e035496d7a41f4d65d0734c297cb283f9a8f963877c0eb6afbd8bc95767f297dead81295659fa42055b92940cccfe9df4
-
Filesize
1KB
MD59f6258b7c0fafde9b1d0ed44ffea7070
SHA1fdbf716e6fd03bb3d2671f854a997ea46efae26f
SHA256d020d9cf2563f8b6021593fa604e9cfbe54bcb8b7361ccdbc220e543a6995045
SHA512dd00a5f40caa128ccaed782e6aba697dbd24ca194f051ef1fa542b3acaaa618e08c822ecec45eac4a37fb29c889dc4df5bb99ca6f328f010c4f4931d88a3ee7b
-
Filesize
507B
MD5956c9c67fe3fa489547c1767afb50ec4
SHA1bc76c3e7df811b582ee153c43b986c8ed107e72a
SHA25665df81aa1a72667285733ff7515632d7c003b2c21b37d623fc3f6663738137c0
SHA5123fd906cb79b534fc63336005a605ee092fb8b028ad660882c3324f72d794cb1198c13fc23390b1fa1e0e895c1963f293b3411ec4599d67a5b8b8fdfd77840200
-
Filesize
4KB
MD5021aa48bed78c67e3a7969be8bc0bb5b
SHA1cca95a2d7d82ed610245d3ae88dd19c339c402ac
SHA256c9ef523d9abcac32bc86cc5e316c03749b64ec4bce0343289c05e9366639696d
SHA512d3e10547d368d50863cc781e1831c5fa6264faa9cc64af6114e7f4e21d361849bbee0784f0d653bc824079e43bdd8ae8d02b5574520497b07e0022cbaaef3c32
-
Filesize
128KB
MD543dac1f3ca6b48263029b348111e3255
SHA19e399fddc2a256292a07b5c3a16b1c8bdd8da5c1
SHA256148f12445f11a50efbd23509139bf06a47d453e8514733b5a15868d10cc6e066
SHA5126e77a429923b503fc08895995eb8817e36145169c2937dacc2da92b846f45101846e98191aeb4f0f2f13fff05d0836aa658f505a04208188278718166c5e3032
-
Filesize
140KB
MD50daf9f07847cceb0f0760bf5d770b8c1
SHA1992cc461f67acea58a866a78b6eefb0cbcc3aaa1
SHA256a2ac2ba27b0ed9acc3f0ea1bef9909a59169bc2eb16c979ef8e736a784bf2fa4
SHA512b4dda28721de88a372af39d4dfba6e612ce06cc443d6a6d636334865a9f8ca555591fb36d9829b54bc0fb27f486d4f216d50f68e1c2df067439fe8ebbf203b6a
-
Filesize
137KB
MD542e2bf4210f8126e3d655218bd2af2e4
SHA178efcb9138eb0c800451cf2bcc10e92a3adf5b72
SHA2561e30126badfffb231a605c6764dd98895208779ef440ea20015ab560263dd288
SHA512c985988d0832ce26337f774b160ac369f2957c306a1d82fbbffe87d9062ae5f3af3c1209768cd574182669cd4495dba26b6f1388814c0724a7812218b0b8dc74
-
Filesize
146KB
MD50eaac872aadc457c87ee995bbf45a9c1
SHA15e9e9b98f40424ad5397fc73c13b882d75499d27
SHA2566f505cc5973687bbda1c2d9ac8a635d333f57c12067c54da7453d9448ab40b8f
SHA512164d1e6ef537d44ac4c0fd90d3c708843a74ac2e08fa2b3f0fdd4a180401210847e0f7bb8ec3056f5dc1d5a54d3239c59fb37914ce7742a4c0eb81578657d24b
-
Filesize
124KB
MD55f1a333671bf167730ed5f70c2c18008
SHA1c8233bbc6178ba646252c6566789b82a3296cab5
SHA256fd2a2b4fe4504c56347c35f24d566cc0510e81706175395d0a2ba26a013c4daf
SHA5126986d93e680b3776eb5700143fc35d60ca9dbbdf83498f8731c673f9fd77c8699a24a4849db2a273aa991b8289e4d6c3142bbde77e11f2faf603df43e8fea105
-
Filesize
136KB
MD561ba5199c4e601fa6340e46bef0dff2d
SHA17c1a51d6d75b001ba1acde2acb0919b939b392c3
SHA2568783f06f7b123e16042bb0af91ff196b698d3cd2aa930e3ea97cfc553d9fc0f4
SHA5128ce180a622a5788bb66c5f3a4abfde62c858e86962f29091e9c157753088ddc826c67c51ff26567bfe2b75737897f14e6bb17ec89f52b525f6577097f1647d31
-
Filesize
119KB
MD52a2ebe526ace7eea5d58e416783d9087
SHA15dabe0f7586f351addc8afc5585ee9f70c99e6c4
SHA256e2a7df4c380667431f4443d5e5fc43964b76c8fcb9cf4c7db921c4140b225b42
SHA51294ed0038068abddd108f880df23422e21f9808ce04a0d14299aacc5d573521f52626c0c2752b314cda976f64de52c4d5bcac0158b37d43afb9bc345f31fdbbc0
-
Filesize
131KB
MD52af7afe35ab4825e58f43434f5ae9a0f
SHA1b67c51cad09b236ae859a77d0807669283d6342f
SHA2567d82694094c1bbc586e554fa87a4b1ed6ebc9eb14902fd429824dcd501339722
SHA51223b7c6db0cb9c918ad9f28fa0e4e683c7e2495e89a136b75b7e1be6380591da61b6fb4f7248191f28fd3d80c4a391744a96434b4ab96b9531b5ebb0ec970b9d0
-
Filesize
11.5MB
MD5f3c64c15a30ffd7b43f82a3789f66b48
SHA19a9b32c84eb1eb0363041ea2c5d8417f02fba864
SHA256e9c834d9eb78be87b91c6a001ebc0fc2d9230ec03e210306d54228e2983d4629
SHA512a41e27323ad7bde4618997a20c2cf9beef3e14313cafdc9348a5bfd4669e322c62ed30c07026c55a96fb04d6c823bd616af7b7d44ea3a3b18aa648f98755a269
-
Filesize
283B
MD5af5ed8f4fe5370516403ae39200f5a4f
SHA19299e9998a0605182683a58a5a6ab01a9b9bc037
SHA2564aa4f0b75548d45c81d8e876e2db1c74bddfd64091f102706d729b50a7af53a5
SHA512f070049a2fae3223861424e7fe79cbae6601c9bee6a56fadde4485ad3c597dc1f3687e720177ab28564a1faab52b6679e9315f74327d02aa1fb31e7b8233a80f
-
Filesize
157KB
MD5df443813546abcef7f33dd9fc0c6070a
SHA1635d2d453d48382824e44dd1e59d5c54d735ee2c
SHA256d14911c838620251f7f64c190b04bb8f4e762318cc763d993c9179376228d8ca
SHA5129f9bea9112d9db9bcecfc8e4800b7e8032efb240cbbddaf26c133b4ce12d27b47dc4e90bc339c561714bc972f6e809b2ec9c9e1facc6c223fbac66b089a14c25
-
Filesize
182KB
MD54a3b7c52ef32d936e3167efc1e920ae6
SHA1d5d8daa7a272547419132ddb6e666f7559dbac04
SHA25626ede848dba071eb76c0c0ef8e9d8ad1c53dfab47ca9137abc9d683032f06ebb
SHA51236d7f8a0a749de049a830cc8c8f0d3962d8dce57b445f5f3c771a86dd11aaa10da5f36f95e55d3dc90900e4dbddd0dcc21052c53aa11f939db691362c42e5312
-
Filesize
197KB
MD59f50134c8be9af59f371f607a6daa0b6
SHA16584b98172cbc4916a7e5ca8d5788493f85f24a7
SHA256dd07117ed80546f23d37f8023e992de560a1f55a76d1eb6dfd9d55baa5e3dad6
SHA5125ccafa2b0e2d20034168ee9a79e8efff64f12f5247f6772815ef4cb9ee56f245a06b088247222c5a3789ae2dcefadbc2c15df4ff5196028857f92b9992b094e0
-
Filesize
260KB
MD5dd71848b5bbd150e22e84238cf985af0
SHA135c7aa128d47710cfdb15bb6809a20dbd0f916d8
SHA256253d18d0d835f482e6abbaf716855580eb8fe789292c937301e4d60ead29531d
SHA5120cbf35c9d7b09fb57d8a9079eab726a3891393f12aee8b43e01d1d979509e755b74c0fb677f8f2dfab6b2e34a141f65d0cfbfe57bda0bf7482841ad31ace7790
-
Filesize
2KB
MD5650c02fc9f949d14d62e32dd7a894f5e
SHA1fa5399b01aadd9f1a4a5632f8632711c186ec0de
SHA256c4d23db8effb359b4aa4d1e1e480486fe3a4586ce8243397a94250627ba4f8cc
SHA512f2caaf604c271283fc7af3aa9674b9d647c4ac53dffca031dbf1220d3ed2e867943f5409a95f41c61d716879bed7c888735f43a068f1cc1452b4196d611cb76d
-
Filesize
200KB
MD56e00495955d4efaac2e1602eb47033ee
SHA195c2998d35adcf2814ec7c056bfbe0a0eb6a100c
SHA2565e24a5fe17ec001cab7118328a4bff0f2577bd057206c6c886c3b7fb98e0d6d9
SHA5122004d1def322b6dd7b129fe4fa7bbe5d42ab280b2e9e81de806f54313a7ed7231f71b62b6138ac767288fee796092f3397e5390e858e06e55a69b0d00f18b866
-
Filesize
256KB
MD519b2050b660a4f9fcb71c93853f2e79c
SHA15ffa886fa019fcd20008e8820a0939c09a62407a
SHA2565421b570fbc1165d7794c08279e311672dc4f42cb7ae1cbddcd7eea0b1136fff
SHA512a93e47387ab0d327b71c3045b3964c7586d0e03dddb2e692f6671fb99659e829591d5f23ce7a95683d82d239ba7d11fb5a123834629a53de5ce5dba6aa714a9a
-
Filesize
2.5MB
MD578eaf97510518dabca6bda558eb23d65
SHA1e52fc6832e7471cd80b1c6ea9826302386daeab2
SHA256280e83e09d1e6a0f751347dcfedcf49df293531b1e3847ca28363e52c569ad1a
SHA51233c176eb987449fa7f8bc9ce50a813adb95013dcf3bfd7e3788fb2dd0d629c695aa7126dfa54e36c62534f18addeec503843e74fb1d448f441f7ceb92be379b7
-
Filesize
319KB
MD5975965814c0a7ea194aeb1b0eeb7ec09
SHA1d99e44da2016a48ceb5819330c7a57c3c8077841
SHA2568f3ef35eb8e3ee61700868d0fc083155432ee0467da4c51d3b794dd7009dfd14
SHA51202e7643594b3800c93eb7e991cb3dde70ca0d232a7e6b35c65b2f24d4bd8580d506e9f554411943b8a2354ad1e37b2e680a894f0080047c5319a64bfca221c9c
-
Filesize
406KB
MD52ffa8223b315687e5d30c7bef2100a71
SHA1bf5d44fb44d5be2571e81000a6cbeb4844557e95
SHA2568df1c44f2be15be95d83a975620c59f6a76a98e5343a08c15852a794859c4ffa
SHA512587619b27d65fd7bd71c15ac59f1b73ef8a506dc478396169678035ab1dee485d56ea4cce1d52951bf71ab5865f1713d7f61952d460637830d5ea83ab303e33b
-
Filesize
261KB
MD5604aeb519f602c31b7fb885646398fcb
SHA1af72d7bdac187b85e34f3e92a2c14a0942061649
SHA25622eb324a2a22f319b96619cf2d0be0bca7f503e776f1a4750c9c983f714c375c
SHA512e26e196536bd7be8925b10d5b4e4c10e4aa4227a47ed87e5889078b16fe840712f7c3a84327924489b52ca3ca284a75a8e185dc75633874c6dc8f3e9f5d77dec
-
Filesize
261KB
MD5604aeb519f602c31b7fb885646398fcb
SHA1af72d7bdac187b85e34f3e92a2c14a0942061649
SHA25622eb324a2a22f319b96619cf2d0be0bca7f503e776f1a4750c9c983f714c375c
SHA512e26e196536bd7be8925b10d5b4e4c10e4aa4227a47ed87e5889078b16fe840712f7c3a84327924489b52ca3ca284a75a8e185dc75633874c6dc8f3e9f5d77dec
-
Filesize
201KB
MD5de625af5cf4822db08035cc897f0b9f2
SHA14440b060c1fa070eb5d61ea9aadda11e4120d325
SHA2563cdb85ee83ef12802efdfc9314e863d4696be70530b31e7958c185fc4d6a9b38
SHA51219b22f43441e8bc72507be850a8154321c20b7351669d15af726145c0d34805c7df58f9dc64a29272a4811268308e503e9840f06e51ccdcb33afd61258339099
-
Filesize
264KB
MD5f9c562b838a3c0620fb6ee46b20b554c
SHA15095f54be57622730698b5c92c61b124dfb3b944
SHA256e08b035d0a894d8bea64e67b1ed0bce27567d417eaaa133e8b231f8a939e581d
SHA512a20bc9a442c698c264fef82aa743d9f3873227d7d55cb908e282fa1f5dcff6b40c5b9ca7802576ef2f5a753fd1c534e9be69464b29af8efec8b019814b875296
-
C:\Users\Admin\AppData\Local\Temp\is-BOP8V.tmp\6d0e14d66da69c163f824f8fa7d87de3eea41cdbd48c0973de296cf6d2d0fed3.tmp
Filesize2.9MB
MD59858749c3a44de91503ba1124f98a4f0
SHA19e871a2a692fe7fa03cbd2b958a48eee9a694758
SHA256058a000842e85dbf501d6fc76fa4a73e13b31102367d06d459c8ba8e7e91a201
SHA51285c8f861cca5adee81d8707627ca008821993c19be35ed86372bd50457ed194d11138e9e34e3e527ef4253857eac372eedd0d7a511ae11927be36eefe39c5dc4
-
Filesize
23.1MB
MD58f210e8bd05d93667412b67c092619a9
SHA19cafdc5c862cb30d5b982f8b2055fe4613401296
SHA2565e9e9499cbdc5e77474918d8a6f09629f5fdc5cb41b78cffb83da64129543689
SHA51227c75d9f2169b50446fe4b33dd5514dba268f5e08beddc75ec22d1b8092df85dd87fba2af037b2528fcd7ef8c258ecfc3f20a046bf8db6b35e60a92fe454a1cc
-
Filesize
23.1MB
MD58f210e8bd05d93667412b67c092619a9
SHA19cafdc5c862cb30d5b982f8b2055fe4613401296
SHA2565e9e9499cbdc5e77474918d8a6f09629f5fdc5cb41b78cffb83da64129543689
SHA51227c75d9f2169b50446fe4b33dd5514dba268f5e08beddc75ec22d1b8092df85dd87fba2af037b2528fcd7ef8c258ecfc3f20a046bf8db6b35e60a92fe454a1cc
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
2.0MB
MD5e1f18a22199c6f6aa5d87b24e5b39ef1
SHA10dcd8f90b575f6f1d10d6789fe769fa26daafd0e
SHA25662c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d
SHA5125a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190
-
Filesize
2.5MB
MD578eaf97510518dabca6bda558eb23d65
SHA1e52fc6832e7471cd80b1c6ea9826302386daeab2
SHA256280e83e09d1e6a0f751347dcfedcf49df293531b1e3847ca28363e52c569ad1a
SHA51233c176eb987449fa7f8bc9ce50a813adb95013dcf3bfd7e3788fb2dd0d629c695aa7126dfa54e36c62534f18addeec503843e74fb1d448f441f7ceb92be379b7
-
Filesize
2.5MB
MD578eaf97510518dabca6bda558eb23d65
SHA1e52fc6832e7471cd80b1c6ea9826302386daeab2
SHA256280e83e09d1e6a0f751347dcfedcf49df293531b1e3847ca28363e52c569ad1a
SHA51233c176eb987449fa7f8bc9ce50a813adb95013dcf3bfd7e3788fb2dd0d629c695aa7126dfa54e36c62534f18addeec503843e74fb1d448f441f7ceb92be379b7
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e