Analysis
-
max time kernel
122s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 07:27
Static task
static1
Behavioral task
behavioral1
Sample
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe
Resource
win10v2004-20220812-en
General
-
Target
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe
-
Size
9.2MB
-
MD5
edf07bd3ea66d2c522c9434c0aaedb42
-
SHA1
09c8d3d9d4cfa81b6aaca1f632b5e54bd32f84ec
-
SHA256
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe
-
SHA512
d2c197cad73ce15c73820756ea0151a4a658f01b96073ead5fccbc205509f24fa2c0a734be50d181ccc2b7375d44989773def5f94013169c382f46218f837fb6
-
SSDEEP
196608:qHyia0/zCoiSgzUfF9FFu9/GIJnF9oWFgCezDc5Eua6BTHtaPI2qr9oDGeGeJaKK:UyJ0/zCoNgzUNfE9DJF5g05EH6xMJkkc
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
e57036b.exedescription ioc process File created C:\Windows\SysWOW64\drivers\6220ca97.sys e57036b.exe -
Executes dropped EXE 5 IoCs
Processes:
e56fdbe.tmp935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exee57036b.exeLivePOT.exeLivePotUpdate.exepid process 3084 e56fdbe.tmp 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2656 e57036b.exe 4940 LivePOT.exe 2064 LivePotUpdate.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exepid process 4172 icacls.exe 212 takeown.exe 316 icacls.exe 2240 takeown.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
e57036b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\6220ca97\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\6220ca97.sys" e57036b.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
LivePOT.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation LivePOT.exe -
Loads dropped DLL 21 IoCs
Processes:
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exeLivePOT.exeLivePotUpdate.exepid process 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 4940 LivePOT.exe 4940 LivePOT.exe 4940 LivePOT.exe 2064 LivePotUpdate.exe 2064 LivePotUpdate.exe 2064 LivePotUpdate.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 212 takeown.exe 316 icacls.exe 2240 takeown.exe 4172 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LivePOTUpdater = "C:\\Program Files (x86)\\LivePOT\\LivePotBoot.exe" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
e57036b.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects e57036b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} e57036b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} e57036b.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
e57036b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e57036b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum e57036b.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum e57036b.exe -
Drops file in System32 directory 60 IoCs
Processes:
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exee57036b.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\vkUserControlsXP.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\MSINET.OCX 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\scrrun.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\msimg32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\wininet.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\vbzlib1.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\INETKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\MSWINSCK.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\SCRRNKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\msvbvm60.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\MSFlxGrd.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll e57036b.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{87BD9072-5E6B-4607-87BC-88E0D30013C2}.catalogItem svchost.exe File created C:\Windows\SysWOW64\MSWINSCK.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\INETKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\GDIPLUS.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SCRRNKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\msvcrt.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\wshtcpip.dll e57036b.exe File created C:\Windows\SysWOW64\stdole2.tlb 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\MSFlxGrd.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\comctl32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\vkUserControlsXP.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\vbzlib1.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\MSCOMCTL.OCX 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\FPSPR70.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\scrrun.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\asycfilt.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\olepro32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\urlmon.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\oleaut32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\GDIPLUS.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\comcat.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\asycfilt.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\WINSKKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\MSCOMCTL.OCX 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\MSINET.OCX 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\MSCMCKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\comctl32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\ws2tcpip.dll e57036b.exe File created C:\Windows\SysWOW64\VB6KO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\olepro32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\msvbvm60.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\MSCMCKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\oleaut32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\FPSPR70.ocx 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\VB6STKIT.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\urlmon.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\winhttp.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\VB6STKIT.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\msimg32.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\midimap.dll e57036b.exe File created C:\Windows\SysWOW64\SysWOW64\VB6KO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0C72C2FB-3FE2-4266-8F6B-332D098F678C}.catalogItem svchost.exe File created C:\Windows\SysWOW64\WINSKKO.DLL 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\wininet.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\msvcrt.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\winhttp.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\stdole2.tlb 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Windows\SysWOW64\SysWOW64\comcat.dll 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe -
Drops file in Program Files directory 8 IoCs
Processes:
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exedescription ioc process File created C:\Program Files (x86)\LivePOT\LivePotBoot.exe 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Program Files (x86)\LivePOT\LivePOTAD.INI 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Program Files (x86)\LivePOT\LivePot.exe 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Program Files (x86)\LivePOT\ÀÌ¿ë¾à°ü.rtf 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Program Files (x86)\LivePOT\UpdateContents.txt 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Program Files (x86)\LivePOT\LivePotUpdate.exe 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Program Files (x86)\LivePOT\LivePotSetting.ini 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe File created C:\Program Files (x86)\LivePOT\LivePotInfo.INI 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4848 schtasks.exe 4852 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Processes:
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7DC6F291-BF55-4E50-B619-EF672D9DCC58}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{C74190B6-8589-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{39977C62-C383-463D-AF61-C71220634656} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{DD9DA666-8594-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2C247F23-8591-11D1-B16A-00C0F0283628}\AlternateCLSID = "{556C2772-F1AD-4DE1-8456-BD6E8F66113B}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\AlternateCLSID = "{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{1EFB6596-857C-11D1-B16A-00C0F0283628}\AlternateCLSID = "{9A948063-66C3-4F63-AB46-582EDAA35047}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6262D3A0-531B-11CF-91F6-C2863C385E30}\AlternateCLSID = "{74DD2713-BA98-4D10-A16E-270BBEB9B555}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{996BF5E0-8044-4650-ADEB-0B013914E99C} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8E3867A3-8586-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{C74190B6-8589-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6262D3A0-531B-11CF-91F6-C2863C385E30}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F91CAF91-225B-43A7-BB9E-472F991FC402}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{35053A22-8589-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{627C8B79-918A-4C5C-9E19-20F66BF30B86}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{66833FE6-8583-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F08DF954-8592-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{627C8B79-918A-4C5C-9E19-20F66BF30B86} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{979127D3-7D01-4FDE-AF65-A698091468AF} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{66833FE6-8583-11D1-B16A-00C0F0283628}\AlternateCLSID = "{8B2ADD10-33B7-4506-9569-0A1E1DBBEBAE}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{C74190B6-8589-11D1-B16A-00C0F0283628}\AlternateCLSID = "{95F0B3BE-E8AC-4995-9DCA-419849E06410}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8E3867A3-8586-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2C247F23-8591-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F91CAF91-225B-43A7-BB9E-472F991FC402}\AlternateCLSID = "{556C2772-F1AD-4DE1-8456-BD6E8F66113B}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BDD1F04B-858B-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{35053A22-8589-11D1-B16A-00C0F0283628}\AlternateCLSID = "{A0E7BF67-8D30-4620-8825-7111714C7CAB}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{DD9DA666-8594-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\AlternateCLSID = "{9A948063-66C3-4F63-AB46-582EDAA35047}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\AlternateCLSID = "{6E5311A1-325D-4FFD-9AF4-B373F02AE458}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{39977C62-C383-463D-AF61-C71220634656}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2C247F23-8591-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{1EFB6596-857C-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7DC6F291-BF55-4E50-B619-EF672D9DCC58} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{979127D3-7D01-4FDE-AF65-A698091468AF}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{24B224E0-9545-4A2F-ABD5-86AA8A849385} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{39977C62-C383-463D-AF61-C71220634656}\AlternateCLSID = "{6E5311A1-325D-4FFD-9AF4-B373F02AE458}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{35053A22-8589-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7DC6F291-BF55-4E50-B619-EF672D9DCC58}\AlternateCLSID = "{8B2ADD10-33B7-4506-9569-0A1E1DBBEBAE}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{66833FE6-8583-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{627C8B79-918A-4C5C-9E19-20F66BF30B86}\AlternateCLSID = "{585AA280-ED8B-46B2-93AE-132ECFA1DAFC}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{1EFB6596-857C-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F91CAF91-225B-43A7-BB9E-472F991FC402} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{996BF5E0-8044-4650-ADEB-0B013914E99C}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{979127D3-7D01-4FDE-AF65-A698091468AF}\AlternateCLSID = "{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\AlternateCLSID = "{95F0B3BE-E8AC-4995-9DCA-419849E06410}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{DD9DA666-8594-11D1-B16A-00C0F0283628}\AlternateCLSID = "{87DACC48-F1C5-4AF3-84BA-A2A72C2AB959}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F08DF954-8592-11D1-B16A-00C0F0283628}\Compatibility Flags = "1024" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8E3867A3-8586-11D1-B16A-00C0F0283628}\AlternateCLSID = "{585AA280-ED8B-46B2-93AE-132ECFA1DAFC}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{996BF5E0-8044-4650-ADEB-0B013914E99C}\AlternateCLSID = "{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F08DF954-8592-11D1-B16A-00C0F0283628}\AlternateCLSID = "{0B314611-2C19-4AB4-8513-A6EEA569D3C4}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6262D3A0-531B-11CF-91F6-C2863C385E30} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe -
Modifies registry class 64 IoCs
Processes:
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA664-8594-11D1-B16A-00C0F0283628}\TypeLib 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\TypeLib 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A64EBB2-5554-4AF1-8C73-F7D9DDC1E33D}\Implemented Categories 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{996BF5E0-8044-4650-ADEB-0B013914E99C}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX, 4" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\Programmable 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F91CAF91-225B-43A7-BB9E-472F991FC402}\InprocServer32 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867A4-8586-11D1-B16A-00C0F0283628}\TypeLib 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CLSID\ = "{48E59293-9880-11CF-9754-00AA00C00908}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33297897-A3F3-48CB-A471-9ABDCECCB939}\TypeLib\ = "{D03BD7A6-46D2-4B8D-B126-DFE88C1FB240}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vkUserContolsXP.clsFastCollection\Clsid\ = "{4B602C9B-9374-499A-88ED-E9A80CDD5C71}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9885E72-73AC-4DB1-AEF2-A54F2C137EF8}\VERSION\ = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\ToolboxBitmap32 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DFFA10E-27E4-436E-859F-2471E764C9A3}\TypeLib\Version = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF681284-6D46-434F-9F2D-BB31314F9685}\VERSION\ = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F94EF446-425A-4484-B6C5-09A363FF7E8B}\ = "vkListBox" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7126EF7-79C1-48FC-A8EB-FC8EE7FFFB99}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74190B6-8589-11D1-B16A-00C0F0283628}\ToolboxBitmap32 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DC6F291-BF55-4E50-B619-EF672D9DCC58}\MiscStatus\ = "0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageComboCtl\CurVer 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8B1F9297-05C1-42C9-AB11-34C259F6FAB0}\VERSION 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9008EB16-773E-4978-B82D-C58A79F19602}\Implemented Categories 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69310C27-4993-11D1-8905-0020AF131A57}\ = "IfpDataObject" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX, 10" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.SBarCtrl\CLSID\ = "{8E3867A3-8586-11D1-B16A-00C0F0283628}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0B314611-2C19-4AB4-8513-A6EEA569D3C4}\InprocServer32\ThreadingModel = "Apartment" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A46E53E3-E42E-45DE-BF36-9A888C43BA22}\InprocServer32 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{627C8B79-918A-4C5C-9E19-20F66BF30B86}\VersionIndependentProgID\ = "MSComctlLib.SBarCtrl" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\Version 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA662-8594-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6319EEA0-531B-11CF-91F6-C2863C385E30}\ = "MSFlexGrid General Property Page Object" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D9FD75A-CD10-471C-B09E-8CBF4051528E}\ProgID 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vkUserContolsXP.vkBar\Clsid 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CCDB0DF2-FD1A-4856-80BC-32929D8359B7}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{81E315A6-5F97-45DA-A34D-F536402DACBC}\TypeLib\Version = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E632D9A-F74A-4340-B907-2489F8A85C5A}\TypeLib\Version = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A519AE3-13ED-4966-ACBE-99ACA137E5B5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C3D2FDB-7C31-4AF5-9476-8560511349D4}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{556C2772-F1AD-4DE1-8456-BD6E8F66113B}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX, 3" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\InprocServer32\ThreadingModel = "Apartment" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.SBarCtrl\CLSID 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87DACC48-F1C5-4AF3-84BA-A2A72C2AB959}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A4-8586-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{74DD2713-BA98-4D10-A16E-270BBEB9B555}\Version\ = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7114683A-020D-4D16-80FD-6ACE384B66DF}\Version\ = "7.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE35-8596-11D1-B16A-00C0F0283628}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F04C-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83FFE12D-0472-44EC-8BB1-6D4426A96286}\ProxyStubClsid32 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vkUserContolsXP.vkTextBox\Clsid\ = "{B97C6297-C1D3-4471-958D-183C4FCEF087}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74190B6-8589-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F91CAF91-225B-43A7-BB9E-472F991FC402}\MiscStatus 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F25901D3-6AF2-41D7-B7FC-FCC359419CE9}\TypeLib\Version = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A46E53E3-E42E-45DE-BF36-9A888C43BA22}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24B224E0-9545-4A2F-ABD5-86AA8A849385}\ToolboxBitmap32 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F91CAF91-225B-43A7-BB9E-472F991FC402}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{609602E0-531B-11CF-91F6-C2863C385E30}\TypeLib\Version = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33297897-A3F3-48CB-A471-9ABDCECCB939}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F94EF446-425A-4484-B6C5-09A363FF7E8B}\ProxyStubClsid 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9008EB16-773E-4978-B82D-C58A79F19602}\VERSION\ = "1.0" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{556C2772-F1AD-4DE1-8456-BD6E8F66113B}\ProgID\ = "MSComctlLib.ImageListCtrl.2" 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B4-8589-11D1-B16A-00C0F0283628} 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F22-8591-11D1-B16A-00C0F0283628}\ProxyStubClsid32 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e57036b.exe935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exepid process 2656 e57036b.exe 2656 e57036b.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe 2656 e57036b.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
e57036b.exepid process 648 2656 e57036b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
e57036b.exetakeown.exetakeown.exedescription pid process Token: SeDebugPrivilege 2656 e57036b.exe Token: SeTakeOwnershipPrivilege 2240 takeown.exe Token: SeTakeOwnershipPrivilege 212 takeown.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
LivePOT.exeLivePotUpdate.exepid process 4940 LivePOT.exe 4940 LivePOT.exe 4940 LivePOT.exe 4940 LivePOT.exe 4940 LivePOT.exe 4940 LivePOT.exe 2064 LivePotUpdate.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exee56fdbe.tmp935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exeLivePOT.exee57036b.execmd.execmd.exedescription pid process target process PID 1544 wrote to memory of 3084 1544 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe e56fdbe.tmp PID 1544 wrote to memory of 3084 1544 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe e56fdbe.tmp PID 1544 wrote to memory of 3084 1544 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe e56fdbe.tmp PID 3084 wrote to memory of 2212 3084 e56fdbe.tmp 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe PID 3084 wrote to memory of 2212 3084 e56fdbe.tmp 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe PID 3084 wrote to memory of 2212 3084 e56fdbe.tmp 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe PID 3084 wrote to memory of 2656 3084 e56fdbe.tmp e57036b.exe PID 3084 wrote to memory of 2656 3084 e56fdbe.tmp e57036b.exe PID 3084 wrote to memory of 2656 3084 e56fdbe.tmp e57036b.exe PID 2212 wrote to memory of 4848 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe schtasks.exe PID 2212 wrote to memory of 4848 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe schtasks.exe PID 2212 wrote to memory of 4848 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe schtasks.exe PID 2212 wrote to memory of 4852 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe schtasks.exe PID 2212 wrote to memory of 4852 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe schtasks.exe PID 2212 wrote to memory of 4852 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe schtasks.exe PID 2212 wrote to memory of 4940 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe LivePOT.exe PID 2212 wrote to memory of 4940 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe LivePOT.exe PID 2212 wrote to memory of 4940 2212 935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe LivePOT.exe PID 4940 wrote to memory of 2064 4940 LivePOT.exe LivePotUpdate.exe PID 4940 wrote to memory of 2064 4940 LivePOT.exe LivePotUpdate.exe PID 4940 wrote to memory of 2064 4940 LivePOT.exe LivePotUpdate.exe PID 2656 wrote to memory of 688 2656 e57036b.exe cmd.exe PID 2656 wrote to memory of 688 2656 e57036b.exe cmd.exe PID 2656 wrote to memory of 688 2656 e57036b.exe cmd.exe PID 688 wrote to memory of 2240 688 cmd.exe takeown.exe PID 688 wrote to memory of 2240 688 cmd.exe takeown.exe PID 688 wrote to memory of 2240 688 cmd.exe takeown.exe PID 688 wrote to memory of 4172 688 cmd.exe icacls.exe PID 688 wrote to memory of 4172 688 cmd.exe icacls.exe PID 688 wrote to memory of 4172 688 cmd.exe icacls.exe PID 2656 wrote to memory of 340 2656 e57036b.exe cmd.exe PID 2656 wrote to memory of 340 2656 e57036b.exe cmd.exe PID 2656 wrote to memory of 340 2656 e57036b.exe cmd.exe PID 340 wrote to memory of 212 340 cmd.exe takeown.exe PID 340 wrote to memory of 212 340 cmd.exe takeown.exe PID 340 wrote to memory of 212 340 cmd.exe takeown.exe PID 340 wrote to memory of 316 340 cmd.exe icacls.exe PID 340 wrote to memory of 316 340 cmd.exe icacls.exe PID 340 wrote to memory of 316 340 cmd.exe icacls.exe PID 2656 wrote to memory of 3564 2656 e57036b.exe cmd.exe PID 2656 wrote to memory of 3564 2656 e57036b.exe cmd.exe PID 2656 wrote to memory of 3564 2656 e57036b.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe"C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e56fdbe.tmp>C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe"C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn LivePOTUpdater /tr "'C:\Program Files (x86)\LivePOT\LivePotBoot.exe'" /sc onlogon /ru NT AUTHORITY\SYSTEM4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn LivePOTUpdater /tr "'C:\Program Files (x86)\LivePOT\LivePotBoot.exe'" /sc onlogon /rl highest /f4⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\LivePOT\LivePOT.exe"C:\Program Files (x86)\LivePOT\LivePOT.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\LivePOT\LivePotUpdate.exe"C:\Program Files (x86)\LivePOT\LivePotUpdate.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\e57036b.exe"C:\Users\Admin\AppData\Local\Temp\\e57036b.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat4⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\LivePOT\LivePOT.exeFilesize
2.4MB
MD58b4c0d1f3a0315fc38a9736b1b457cdd
SHA1fd7435b6bb39534afda09abdafedc372e42f23b6
SHA256064dfc8b95d000ceaa23bf74165be230a1bc11ec1cb55bc3ff5508995f9b2733
SHA512c12da746f819239971f32c5f6e6c486212013543d9adf7de9689489e9beca33c80599308b4edb703e53ef818482e559311d1799f8f14b407fc0d0c7d0357748a
-
C:\Program Files (x86)\LivePOT\LivePot.exeFilesize
2.4MB
MD58b4c0d1f3a0315fc38a9736b1b457cdd
SHA1fd7435b6bb39534afda09abdafedc372e42f23b6
SHA256064dfc8b95d000ceaa23bf74165be230a1bc11ec1cb55bc3ff5508995f9b2733
SHA512c12da746f819239971f32c5f6e6c486212013543d9adf7de9689489e9beca33c80599308b4edb703e53ef818482e559311d1799f8f14b407fc0d0c7d0357748a
-
C:\Program Files (x86)\LivePOT\LivePotUpdate.exeFilesize
422KB
MD5884e84871a5f861323e66d810b176d43
SHA16f0e73391dcbce8767761700cf01bc8117612f3f
SHA256d08dac87418c8194f9478cb4ccb569953fb55f3dbbc11e50132dc8442d46d47c
SHA5128e1852d63d90baec58854907a23e740ae345938d40c08e25d54ec8608a43105cfbb74cf9f44f8ffb3f4671e79ef4751b25b3b423f5428440169aa2c783d6625c
-
C:\Program Files (x86)\LivePOT\LivePotUpdate.exeFilesize
422KB
MD5884e84871a5f861323e66d810b176d43
SHA16f0e73391dcbce8767761700cf01bc8117612f3f
SHA256d08dac87418c8194f9478cb4ccb569953fb55f3dbbc11e50132dc8442d46d47c
SHA5128e1852d63d90baec58854907a23e740ae345938d40c08e25d54ec8608a43105cfbb74cf9f44f8ffb3f4671e79ef4751b25b3b423f5428440169aa2c783d6625c
-
C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exeFilesize
8.0MB
MD5c6f612d33b5aa4e8d27288b18ab22eae
SHA10f983fc1badf45c8fa243dd7536a2fe6f23d2c16
SHA256f481273c07c6687c516d4425d42a60582bc17f471bd2201f2df68820e6a1c6a4
SHA51237b2a6c46d0a846e758591cc33dbd0cc609af489407b2b9cf3f5cf05dfcb0d97d3b610063c8ae8c8abcc0e2b9485e3575d2bf09f342cb230ab2743598aac313a
-
C:\Users\Admin\AppData\Local\Temp\935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe.exeFilesize
8.0MB
MD5c6f612d33b5aa4e8d27288b18ab22eae
SHA10f983fc1badf45c8fa243dd7536a2fe6f23d2c16
SHA256f481273c07c6687c516d4425d42a60582bc17f471bd2201f2df68820e6a1c6a4
SHA51237b2a6c46d0a846e758591cc33dbd0cc609af489407b2b9cf3f5cf05dfcb0d97d3b610063c8ae8c8abcc0e2b9485e3575d2bf09f342cb230ab2743598aac313a
-
C:\Users\Admin\AppData\Local\Temp\ahnmove.batFilesize
179B
MD55a000db6d9bd8b3bacdfa04e5ff20677
SHA1e7400b4f55b9ffbf7b46b491aa164803fdf73cca
SHA2564ade250a300f5e283a92819252a86c2b16fbf625b6984168e139f5b879e163bb
SHA5124d63eca514e47cf456fba022182b553d1adf6caa8ec613b71edf410f149d0544c3af54a84f9067590cf5c6abe940598d941349a7dc9834fa05c39b9efac6fd87
-
C:\Users\Admin\AppData\Local\Temp\e56fdbe.tmpFilesize
9.2MB
MD5edf07bd3ea66d2c522c9434c0aaedb42
SHA109c8d3d9d4cfa81b6aaca1f632b5e54bd32f84ec
SHA256935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe
SHA512d2c197cad73ce15c73820756ea0151a4a658f01b96073ead5fccbc205509f24fa2c0a734be50d181ccc2b7375d44989773def5f94013169c382f46218f837fb6
-
C:\Users\Admin\AppData\Local\Temp\e56fdbe.tmpFilesize
9.2MB
MD5edf07bd3ea66d2c522c9434c0aaedb42
SHA109c8d3d9d4cfa81b6aaca1f632b5e54bd32f84ec
SHA256935ab593fe53ee7261bc8e131db83ebd9b895714683e76fe8010f04018cba7fe
SHA512d2c197cad73ce15c73820756ea0151a4a658f01b96073ead5fccbc205509f24fa2c0a734be50d181ccc2b7375d44989773def5f94013169c382f46218f837fb6
-
C:\Users\Admin\AppData\Local\Temp\e57036b.exeFilesize
1.2MB
MD52d3f33549e91825a2cc2fe246cbe2799
SHA112f12f054ab1e6daf81d85d757830a0f63d690bd
SHA2568e7f939be042059f271258fbb68be5a31f8fd69810f258681ff48fe76cdfc02b
SHA51213e68dc2541a8bc2e8b39449567863fa30fbfe04ce4759e3bf25cba1755b7adfffad0466aca5743a13d5615047dd87a53db80dc201d5cbe7f0f700c65986efc6
-
C:\Users\Admin\AppData\Local\Temp\e57036b.exeFilesize
1.2MB
MD52d3f33549e91825a2cc2fe246cbe2799
SHA112f12f054ab1e6daf81d85d757830a0f63d690bd
SHA2568e7f939be042059f271258fbb68be5a31f8fd69810f258681ff48fe76cdfc02b
SHA51213e68dc2541a8bc2e8b39449567863fa30fbfe04ce4759e3bf25cba1755b7adfffad0466aca5743a13d5615047dd87a53db80dc201d5cbe7f0f700c65986efc6
-
C:\Users\Admin\AppData\Local\Temp\nsc1AFB.tmp\KillProcDLL.dllFilesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
C:\Users\Admin\AppData\Local\Temp\nsc1AFB.tmp\nsExec.dllFilesize
6KB
MD514f5984b926208de2aafb55dd9971d4a
SHA1e5afe0b80568135d3e259c73f93947d758a7b980
SHA256030bcfa82e3bb424835a5fa53a3ff17ab08557d3bbeea4815313036fc4bdafe1
SHA512e9ec97dd57ead871789d49ed38d9fde5f31d3cb2547810cae49a736e06b9f9b28cf8efea825eb83c3e07d880ee798abfb9069c6957416d5973c83e4531814e27
-
C:\Users\Admin\AppData\Local\Temp\nsc1AFB.tmp\nsExec.dllFilesize
6KB
MD514f5984b926208de2aafb55dd9971d4a
SHA1e5afe0b80568135d3e259c73f93947d758a7b980
SHA256030bcfa82e3bb424835a5fa53a3ff17ab08557d3bbeea4815313036fc4bdafe1
SHA512e9ec97dd57ead871789d49ed38d9fde5f31d3cb2547810cae49a736e06b9f9b28cf8efea825eb83c3e07d880ee798abfb9069c6957416d5973c83e4531814e27
-
C:\Windows\SysWOW64\FPSPR70.ocxFilesize
1.3MB
MD526c857ff23c3ce707b0ee408add08c96
SHA14fc3eaf37ae77802576c980fb5bd24b26db2edeb
SHA256d9d1a8343a984668a7f858a72e560d7ebcc3eba868eac4e4ad80e9ac6e4e75b3
SHA512a51f6cf0a911e6a0df5189c0c6f52a5d4fa2c4b52ea3dafed15c2013c969358258ef386d860cb8352f29dfd874ed5c8618daaacf7397c01a27b31e87e18d872a
-
C:\Windows\SysWOW64\FPSPR70.ocxFilesize
1.3MB
MD526c857ff23c3ce707b0ee408add08c96
SHA14fc3eaf37ae77802576c980fb5bd24b26db2edeb
SHA256d9d1a8343a984668a7f858a72e560d7ebcc3eba868eac4e4ad80e9ac6e4e75b3
SHA512a51f6cf0a911e6a0df5189c0c6f52a5d4fa2c4b52ea3dafed15c2013c969358258ef386d860cb8352f29dfd874ed5c8618daaacf7397c01a27b31e87e18d872a
-
C:\Windows\SysWOW64\FPSPR70.ocxFilesize
1.3MB
MD526c857ff23c3ce707b0ee408add08c96
SHA14fc3eaf37ae77802576c980fb5bd24b26db2edeb
SHA256d9d1a8343a984668a7f858a72e560d7ebcc3eba868eac4e4ad80e9ac6e4e75b3
SHA512a51f6cf0a911e6a0df5189c0c6f52a5d4fa2c4b52ea3dafed15c2013c969358258ef386d860cb8352f29dfd874ed5c8618daaacf7397c01a27b31e87e18d872a
-
C:\Windows\SysWOW64\INETKO.DLLFilesize
13KB
MD519e49c4802e54762f613cc3fd5c240c9
SHA1cee468cfd04f12a9fcaa9549fd4e533afc745da4
SHA2566672e7889d5671716182b4723963a7a5354731563eb5abb67c19a3f6e79f4d8b
SHA51296bc601aa00395b902ef2361e863d09c828cda1a83f97b4031a8cf2f3f971c072097b1b3e8fa47a2c4ba8b945d79d9e240504aad239aafbe307ad13164f950a5
-
C:\Windows\SysWOW64\MSCMCKO.DLLFilesize
121KB
MD51aedbff4f92aa576b0389deee971dc3c
SHA18814275b1ac156e7fd247f0a4071e62d247760c0
SHA2567713469fb22fef9d711b3822f1df02e045d586ac06a4107a228a96e864da0a3f
SHA51247d890b1e5bb71980c72079be5ebc7e491141b6465a91e047a47e4f163ff95e828c358e0f95abec1a73d47b3a866890d25ca48a625d60f939a829753a885f564
-
C:\Windows\SysWOW64\MSCOMCTL.OCXFilesize
1.0MB
MD5e52859fcb7a827cacfce7963184c7d24
SHA135c4ae05d90f610c0520933faaca2a8d39e1b2a1
SHA25645b6eef5bbf223cf8ff78f5014b68a72f0bc2cceaed030dece0a1abacf88f1f8
SHA512013e6bf4762b1f90650ee6a1cb275607d1cad9df481362f42606a37f3a6f63de5cd0cdb0e9739df141b58f67ac079cf27be4ffe4937371972dd14eae18c58a94
-
C:\Windows\SysWOW64\MSCOMCTL.OCXFilesize
1.0MB
MD5e52859fcb7a827cacfce7963184c7d24
SHA135c4ae05d90f610c0520933faaca2a8d39e1b2a1
SHA25645b6eef5bbf223cf8ff78f5014b68a72f0bc2cceaed030dece0a1abacf88f1f8
SHA512013e6bf4762b1f90650ee6a1cb275607d1cad9df481362f42606a37f3a6f63de5cd0cdb0e9739df141b58f67ac079cf27be4ffe4937371972dd14eae18c58a94
-
C:\Windows\SysWOW64\MSCOMCTL.OCXFilesize
1.0MB
MD5e52859fcb7a827cacfce7963184c7d24
SHA135c4ae05d90f610c0520933faaca2a8d39e1b2a1
SHA25645b6eef5bbf223cf8ff78f5014b68a72f0bc2cceaed030dece0a1abacf88f1f8
SHA512013e6bf4762b1f90650ee6a1cb275607d1cad9df481362f42606a37f3a6f63de5cd0cdb0e9739df141b58f67ac079cf27be4ffe4937371972dd14eae18c58a94
-
C:\Windows\SysWOW64\MSFlxGrd.ocxFilesize
252KB
MD520e06689d038e05795863694b5e1dcd7
SHA18183998f4cdc7fda02e45fed0b41bd90153ff944
SHA2567827dbdbd340cee846a61238002e5d438b859c06c80e540f29130ce654cc0918
SHA512cf47105c8bb236025b386f9c6e7cb96abd3484abf04960cdaee562f05c5c3b45e17699449d4e60333e55b0cb316433e6a0d63b94a9fe36d8e9adc2fc871d343b
-
C:\Windows\SysWOW64\MSFlxGrd.ocxFilesize
252KB
MD520e06689d038e05795863694b5e1dcd7
SHA18183998f4cdc7fda02e45fed0b41bd90153ff944
SHA2567827dbdbd340cee846a61238002e5d438b859c06c80e540f29130ce654cc0918
SHA512cf47105c8bb236025b386f9c6e7cb96abd3484abf04960cdaee562f05c5c3b45e17699449d4e60333e55b0cb316433e6a0d63b94a9fe36d8e9adc2fc871d343b
-
C:\Windows\SysWOW64\MSFlxGrd.ocxFilesize
252KB
MD520e06689d038e05795863694b5e1dcd7
SHA18183998f4cdc7fda02e45fed0b41bd90153ff944
SHA2567827dbdbd340cee846a61238002e5d438b859c06c80e540f29130ce654cc0918
SHA512cf47105c8bb236025b386f9c6e7cb96abd3484abf04960cdaee562f05c5c3b45e17699449d4e60333e55b0cb316433e6a0d63b94a9fe36d8e9adc2fc871d343b
-
C:\Windows\SysWOW64\MSINET.OCXFilesize
129KB
MD590a39346e9b67f132ef133725c487ff6
SHA19cd22933f628465c863bed7895d99395acaa5d2a
SHA256e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2
SHA5120337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf
-
C:\Windows\SysWOW64\MSINET.OCXFilesize
129KB
MD590a39346e9b67f132ef133725c487ff6
SHA19cd22933f628465c863bed7895d99395acaa5d2a
SHA256e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2
SHA5120337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf
-
C:\Windows\SysWOW64\MSINET.OCXFilesize
129KB
MD590a39346e9b67f132ef133725c487ff6
SHA19cd22933f628465c863bed7895d99395acaa5d2a
SHA256e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2
SHA5120337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf
-
C:\Windows\SysWOW64\MSINET.OCXFilesize
129KB
MD590a39346e9b67f132ef133725c487ff6
SHA19cd22933f628465c863bed7895d99395acaa5d2a
SHA256e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2
SHA5120337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf
-
C:\Windows\SysWOW64\MSWINSCK.ocxFilesize
124KB
MD540fce4be52f6015c23fd96a4b3351357
SHA1f4a23cee42125f20444a4b005555d631df2aaacf
SHA256a0bf5f1ed8d34fd0b6cb1432618986f90256ef4f8c86a1460823e6dfa8edd8ca
SHA51269f7a8c8a5e82a2c975e410d834aa24ed0b1a32f592fb85eac15b8d3c1bee2dc1c1c88c0dbba0435339cde92e437efebf66c7c15dde1153338b4bd3e536fc922
-
C:\Windows\SysWOW64\SCRRNKO.DLLFilesize
10KB
MD57800f2d5e578de3ef92dbff5f88d0f44
SHA1e570939c7e2174e8ca7031ce795b13992998b137
SHA256b065efd98b92caa0614f12f91cb844685675d54daf1455e7f1623795241a2461
SHA5127eb6f8c971639710514a2380d2eadb80ab50b7f122a5a1c50d358171a8f584255dbfaa039fc1e839974fe21c547fe676245276a4e743b2b44df1ddb3cdf0333b
-
C:\Windows\SysWOW64\VB6KO.DLLFilesize
99KB
MD584742b5754690ed667372be561cf518d
SHA1ef97aa43f804f447498568fc33704800b91a7381
SHA25652b64e2bfc9ee0b807f2095726ace9e911bcd907054ac15686a4e7d2fd4dc751
SHA51272ac19a3665a01519dac2ad43eb6178a66ad7f4e167f2a882cbca242978f8debe3e15d0e210c3b0391590699999f33a1fd5de4ca6559ff894b4e6cb4ac1415a0
-
C:\Windows\SysWOW64\VB6KO.DLLFilesize
99KB
MD584742b5754690ed667372be561cf518d
SHA1ef97aa43f804f447498568fc33704800b91a7381
SHA25652b64e2bfc9ee0b807f2095726ace9e911bcd907054ac15686a4e7d2fd4dc751
SHA51272ac19a3665a01519dac2ad43eb6178a66ad7f4e167f2a882cbca242978f8debe3e15d0e210c3b0391590699999f33a1fd5de4ca6559ff894b4e6cb4ac1415a0
-
C:\Windows\SysWOW64\VB6STKIT.DLLFilesize
100KB
MD560bcd4b3e1f34299aeededbf46d67719
SHA19ecf20fd4652d7ec1763c405ea8769a807985514
SHA256635b9f96fc1d8b59e6ea951061e77b5f94cd52d8ac2a8ac4c6a706458dd85864
SHA512fd0bc3cb0691a716deb5afc4f10a4b377fc917785ea465d6aedcf4842aaa47c96a4528d59e67cf2b07f240aad91269923ad3a7d29885c3f9b1a0e868d1cb06dd
-
C:\Windows\SysWOW64\WINSKKO.DLLFilesize
14KB
MD5f1edb10b29a457ab81f101c62f70b5a4
SHA14a5a21ee4fca5368a79613ef8cf0d4b5f020fbeb
SHA256efe28fa83ba93c47bb01f412d8e555eea9b1b274e2946ae0bdfa40cc0972c53c
SHA512af0576dd5108bf441e9949f5f1f09d8b3bd284cc44c8ffabcda925949533a7dc1f39886a903866ca1607731896c4b060cb46b12eea28e3b09cb1e38deba16a5f
-
C:\Windows\SysWOW64\vb6ko.dllFilesize
99KB
MD584742b5754690ed667372be561cf518d
SHA1ef97aa43f804f447498568fc33704800b91a7381
SHA25652b64e2bfc9ee0b807f2095726ace9e911bcd907054ac15686a4e7d2fd4dc751
SHA51272ac19a3665a01519dac2ad43eb6178a66ad7f4e167f2a882cbca242978f8debe3e15d0e210c3b0391590699999f33a1fd5de4ca6559ff894b4e6cb4ac1415a0
-
C:\Windows\SysWOW64\vkUserControlsXP.ocxFilesize
1.1MB
MD59d1237a31acf68625e32856552d1643f
SHA1ecb852670b6734d9946070aa38a3b26931c1d79d
SHA2566e4e9b48f7105929362286ab434273d1828d08e9b69921d7bb6f175dcaa6170c
SHA512ccb206060efe3569a4cc4693ddc4b0c65288238183d6676a4c706b2fff0875a32efd303dd1e4ebe96020624883afd961ffb78316898fbd5d52d24060ad7d696e
-
memory/212-190-0x0000000000000000-mapping.dmp
-
memory/316-191-0x0000000000000000-mapping.dmp
-
memory/340-189-0x0000000000000000-mapping.dmp
-
memory/688-186-0x0000000000000000-mapping.dmp
-
memory/1544-132-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1544-135-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2064-177-0x0000000000000000-mapping.dmp
-
memory/2212-137-0x0000000000000000-mapping.dmp
-
memory/2240-187-0x0000000000000000-mapping.dmp
-
memory/2656-143-0x0000000000550000-0x0000000000570000-memory.dmpFilesize
128KB
-
memory/2656-158-0x0000000001000000-0x0000000001C37000-memory.dmpFilesize
12.2MB
-
memory/2656-193-0x0000000001000000-0x0000000001C37000-memory.dmpFilesize
12.2MB
-
memory/2656-155-0x0000000000550000-0x0000000000570000-memory.dmpFilesize
128KB
-
memory/2656-144-0x0000000001000000-0x0000000001C37000-memory.dmpFilesize
12.2MB
-
memory/2656-139-0x0000000000000000-mapping.dmp
-
memory/3084-142-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3084-133-0x0000000000000000-mapping.dmp
-
memory/3564-192-0x0000000000000000-mapping.dmp
-
memory/4172-188-0x0000000000000000-mapping.dmp
-
memory/4848-162-0x0000000000000000-mapping.dmp
-
memory/4852-164-0x0000000000000000-mapping.dmp
-
memory/4940-165-0x0000000000000000-mapping.dmp