Analysis
-
max time kernel
786s -
max time network
826s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2023, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
VEGAS_Pro_20.0.0.214.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
VEGAS_Pro_20.0.0.214.exe
Resource
win10v2004-20221111-en
General
-
Target
VEGAS_Pro_20.0.0.214.exe
-
Size
574.9MB
-
MD5
059274e07bbf83ec5b5d4f1d957681eb
-
SHA1
b0dd598c4dd719ccfc80d769becf5d0589a74eaa
-
SHA256
e3e504169f03591d5ac617e027c124549f9073a2c357c64cac92cb2b83639145
-
SHA512
3e6b5305eca533809dac53be730c8f525bf28c54aa4e17d151272f05efa4da03172a700f932a2510ea0c349b822136ae8ad76ed47c621e4b0f34e4394616da43
-
SSDEEP
12582912:jDMbxgS/TLHSky47LmxRPF/ELbsnW4sxs2K53K2Cm/Fi2DPScaXm:jDyxgS/HXyGLmxRh4s+xs2w3KTm/Fi2T
Malware Config
Extracted
C:\Program Files\VEGAS\VEGAS Pro 20.0\VEGASCapture\LICENSES.chromium.html
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
http://www.apache.org/licenses/
http://www.apache.org/licenses/LICENSE-2.0
http://code.google.com/p/y2038
http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2
http://mozilla.org/MPL/2.0/
http://www.torchmobile.com/
https://cla.developers.google.com/clas
http://www.openssl.org/)"
https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS
http://www.opensource.apple.com/apsl/
http://www.mozilla.org/MPL/
http://www.apple.com/legal/guidelinesfor3rdparties.html
http://developer.intel.com/vtune/cbts/strmsimd/922down.htm
http://skal.planet-d.net/coding/dct.html
http://developer.intel.com/vtune/cbts/strmsimd/appnotes.htm
http://www.elecard.com/peter/idct.html
http://www.linuxvideo.org/mpeg2dec/
https://firebase.google.com/terms/analytics/
https://www.freetype.org
https://www.khronos.org/registry/
http://source.android.com/
http://source.android.com/compatibility
http://www.mozilla.org/MPL/2.0/
http://www.mozilla.org/MPL/2.0/FAQ.html
http://freetype.sourceforge.net/license.html
http://www.freetype.org
http://source.icu-project.org/repos/icu/icu/trunk/license.html
http://icu-project.org/userguide/icufaq.html
http://www.unicode.org/copyright.html
http://www.unicode.org/Public/
http://www.unicode.org/reports/
http://www.unicode.org/cldr/data/
http://jquery.com/
https://github.com/jquery/jquery/blob/master/MIT-LICENSE.txt
https://github.com/jquery/sizzle/blob/master/LICENSE
http://ctrio.sourceforge.net/
http://www.cisl.ucar.edu/css/software/fftpack5/ftpk.html
http://www.opensource.org/licenses/mit-license.php
http://www.opensource.org/licenses/bsd-license.php
http://opensource.org/licenses/bsd-license.php
https://sourceforge.net/project/?group_id=1519
http://chasen.aist-nara.ac.jp/chasen/distribution.html
http://casper.beckman.uiuc.edu/~c-tsai4
http://code.google.com/p/lao-dictionary/
http://lao-dictionary.googlecode.com/git/Lao-Dictionary.txt
http://lao-dictionary.googlecode.com/git/Lao-Dictionary-LICENSE.txt
http://oss.sgi.com/projects/FreeB/
http://llvm.org
http://rentzsch.com
http://opensource.org/licenses/mit
http://modp.com/release/base64
http://sourceware.org/newlib/docs.html
http://sourceware.org/ml/newlib/
https://datatracker.ietf.org/ipr/1524/
https://datatracker.ietf.org/ipr/1914/
https://datatracker.ietf.org/ipr/1526/
https://creativecommons.org/licenses/by/3.0/
https://sites.google.com/site/gaviotachessengine/Home/endgame-tablebases-1
http://www.ploscompbiol.org/static/license
http://www.gutenberg.org/ebooks/53
http://www.suitable.com
http://www.nongnu.org/freebangfont/downloads.html#mukti
https://dejavu-fonts.github.io/Download.html">homepage</a></span>
http://scripts.sil.org/OFL
https://code.google.com/p/sctp-refimpl/source/browse/trunk/COPYRIGHT
http://src.chromium.org/viewvc/chrome/trunk/deps/third_party/xz/COPYING
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 35 IoCs
pid Process 2780 VEGAS_Pro_20_setup.exe 3992 ChromeRecovery.exe 3384 vcredist_x86.exe 2656 vcredist_x86.exe 3180 vcredist_x64.exe 1372 vcredist_x64.exe 1532 MicrosoftEdgeWebView2RuntimeInstallerX64.exe 4480 MicrosoftEdgeUpdate.exe 5100 MicrosoftEdgeUpdate.exe 1800 MicrosoftEdgeUpdate.exe 3020 MicrosoftEdgeUpdateComRegisterShell64.exe 3500 MicrosoftEdgeUpdateComRegisterShell64.exe 2168 MicrosoftEdgeUpdateComRegisterShell64.exe 4524 MicrosoftEdgeUpdate.exe 4108 MicrosoftEdgeUpdate.exe 4432 MicrosoftEdgeUpdate.exe 3492 MicrosoftEdgeUpdate.exe 4572 MicrosoftEdgeWebview_X64_98.0.1108.43.exe 3924 setup.exe 3964 MicrosoftEdgeUpdate.exe 4504 vegas200.exe 3324 ErrorReportLauncher.exe 4128 vegas200.exe 2896 ErrorReportLauncher.exe 2412 MicrosoftEdgeUpdate.exe 3188 MicrosoftEdgeUpdate.exe 3976 MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe 4872 MicrosoftEdgeUpdate.exe 3096 MicrosoftEdgeUpdate.exe 3772 MicrosoftEdgeUpdate.exe 4804 MicrosoftEdgeUpdate.exe 5100 MicrosoftEdgeUpdateComRegisterShell64.exe 916 MicrosoftEdgeUpdateComRegisterShell64.exe 4640 MicrosoftEdgeUpdateComRegisterShell64.exe 2680 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F59DD74A-14E1-11D2-B3B2-00A0C90642CC}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F3B8E880-B4E0-11D0-AEBC-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack2_x64.dll" ngen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{824AFE10-2098-4254-B2C3-00A0C9053912}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{ED1B4101-93BE-11D0-AEBC-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack1_x64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23C9F225-40EC-11D2-9D36-00C04F8EDC1E}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2D7C794-D104-4B28-9FB3-00AA006BA2BA}\InprocServer32\ThreadingModel = "Both" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{39224541-6F92-11D0-AEBC-00A0C9053912}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A6A78627-D619-48BF-AD26-0C6B44B5C7D8}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EE38CA88-D78E-4BFB-B05E-577892730C83}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sffrgpnv_x64.dll" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54F29261-79B1-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B7226EE-4584-11D1-B4CB-00A0C9270A10}\InprocServer32 ngen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D616F3E1-D622-11CE-AAC5-0020AF0B99A3}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack2_x64.dll" ngen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{026D0AA1-9BB9-11D0-AEBC-00A0C9053912}\InprocServer32 ngen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{824AFE10-2098-4254-B2C3-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfresfilter_x64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00000003-0F56-11D2-9887-00A0C969725B}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfxpfx2_x64.dll" mscorsvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A6DF8F41-BAF4-11D0-AEBC-00A0C9053912}\InprocServer32 ngen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E3E4541-8339-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{39224540-6F92-11D0-AEBC-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack3_x64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5204E8B8-4657-4733-A6EB-00AA006BA2BA}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfxpfx3_x64.dll" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{607682E0-6E21-11D0-AEBC-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack1_x64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B97C0F23-196D-11D1-B99B-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack2_x64.dll" ngen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2F27D2C8-2AA0-48A2-B082-00AA006BA2BA}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{ED1B4100-93BE-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB0F363-3A6E-485D-B39C-00AA006BA2BA}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28D9F1E0-6ECC-11D0-AEBC-00A0C9053912}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA97FC2A-0F62-11D2-9887-00A0C969725B}\InprocServer32 mscorsvw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA97FC22-0F62-11D2-9887-00A0C969725B}\InprocServer32\ThreadingModel = "Both" mscorsvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5204E8B8-4657-4733-A6EB-00AA006BA2BA}\InprocServer32 chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F09F6980-7845-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00000006-0F56-11D2-9887-00A0C969725B}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1010333D-5114-41CE-807B-4483785EEF84}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\xpvinyl_x64.dll" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D616F3E0-D622-11CE-AAC5-0020AF0B99A3}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack2_x64.dll" ngen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{026D0AA1-9BB9-11D0-AEBC-00A0C9053912}\InprocServer32\ThreadingModel = "Both" ngen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F09F6981-7845-11D0-AEBC-00A0C9053912}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D6802BA1-A056-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0000000A-0F56-11D2-9887-00A0C969725B}\InprocServer32 chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8010C341-6D4C-4390-B828-E4D246C3DDB2}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23C9F225-40EC-11D2-9D36-00C04F8EDC1E}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA97FC26-0F62-11D2-9887-00A0C969725B}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00000000-0F56-11D2-9887-00A0C969725B}\InprocServer32\ThreadingModel = "Both" mscorsvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5FF5B4A1-858F-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E3E4540-8339-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA97FC2A-0F62-11D2-9887-00A0C969725B}\InprocServer32\ThreadingModel = "Both" mscorsvw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{65A0ED34-90A1-46F6-99B7-00AA006BA2BA}\InprocServer32\ThreadingModel = "Both" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{70046AFD-C0B1-4EB0-9D13-00AA006BA2BA}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA97FC26-0F62-11D2-9887-00A0C969725B}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfxpfx1_x64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7298A3E0-78EE-11D0-AEBC-00A0C9053912}\InprocServer32\ThreadingModel = "Both" MsiExec.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation VEGAS_Pro_20.0.0.214.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Loads dropped DLL 64 IoCs
pid Process 2656 vcredist_x86.exe 3012 vcredist_x86.exe 1372 vcredist_x64.exe 4324 vcredist_x64.exe 4480 MicrosoftEdgeUpdate.exe 5100 MicrosoftEdgeUpdate.exe 1800 MicrosoftEdgeUpdate.exe 3020 MicrosoftEdgeUpdateComRegisterShell64.exe 1800 MicrosoftEdgeUpdate.exe 3500 MicrosoftEdgeUpdateComRegisterShell64.exe 1800 MicrosoftEdgeUpdate.exe 2168 MicrosoftEdgeUpdateComRegisterShell64.exe 1800 MicrosoftEdgeUpdate.exe 4524 MicrosoftEdgeUpdate.exe 4108 MicrosoftEdgeUpdate.exe 4432 MicrosoftEdgeUpdate.exe 4432 MicrosoftEdgeUpdate.exe 4108 MicrosoftEdgeUpdate.exe 3492 MicrosoftEdgeUpdate.exe 3964 MicrosoftEdgeUpdate.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 4524 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 1004 MsiExec.exe 2164 MsiExec.exe 2164 MsiExec.exe 2164 MsiExec.exe 3492 MsiExec.exe 3492 MsiExec.exe 3492 MsiExec.exe 1648 MsiExec.exe 1648 MsiExec.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} = "\"C:\\ProgramData\\Package Cache\\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\\vcredist_x86.exe\" /burn.runonce" vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7} = "\"C:\\ProgramData\\Package Cache\\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\\vcredist_x64.exe\" /burn.runonce" vcredist_x64.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: VEGAS_Pro_20_setup.exe File opened (read-only) \??\M: VEGAS_Pro_20_setup.exe File opened (read-only) \??\Q: VEGAS_Pro_20_setup.exe File opened (read-only) \??\V: VEGAS_Pro_20_setup.exe File opened (read-only) \??\W: VEGAS_Pro_20_setup.exe File opened (read-only) \??\Z: VEGAS_Pro_20_setup.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: VEGAS_Pro_20_setup.exe File opened (read-only) \??\O: VEGAS_Pro_20_setup.exe File opened (read-only) \??\T: VEGAS_Pro_20_setup.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: VEGAS_Pro_20_setup.exe File opened (read-only) \??\U: VEGAS_Pro_20_setup.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: VEGAS_Pro_20_setup.exe File opened (read-only) \??\J: VEGAS_Pro_20_setup.exe File opened (read-only) \??\L: VEGAS_Pro_20_setup.exe File opened (read-only) \??\P: VEGAS_Pro_20_setup.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: VEGAS_Pro_20_setup.exe File opened (read-only) \??\Y: VEGAS_Pro_20_setup.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: VEGAS_Pro_20_setup.exe File opened (read-only) \??\R: VEGAS_Pro_20_setup.exe File opened (read-only) \??\X: VEGAS_Pro_20_setup.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: VEGAS_Pro_20_setup.exe File opened (read-only) \??\F: VEGAS_Pro_20_setup.exe File opened (read-only) \??\H: VEGAS_Pro_20_setup.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: VEGAS_Pro_20_setup.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\msvcp120.dll msiexec.exe File opened for modification C:\Windows\system32\vccorlib120.dll msiexec.exe File opened for modification C:\Windows\system32\vcomp120.dll msiexec.exe File created C:\Windows\system32\vcomp120.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120u.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120esn.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120chs.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120ita.dll msiexec.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA vegas200.exe File created C:\Windows\system32\mfc120enu.dll msiexec.exe File created C:\Windows\system32\mfc120rus.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120deu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120kor.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm120u.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120cht.dll msiexec.exe File created C:\Windows\system32\vccorlib120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120u.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120enu.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120fra.dll msiexec.exe File created C:\Windows\system32\msvcr120.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120jpn.dll msiexec.exe File created C:\Windows\system32\mfc120deu.dll msiexec.exe File created C:\Windows\system32\mfc120jpn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120ita.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120kor.dll msiexec.exe File created C:\Windows\system32\mfc120.dll msiexec.exe File created C:\Windows\system32\mfc120cht.dll msiexec.exe File created C:\Windows\system32\mfc120fra.dll msiexec.exe File created C:\Windows\system32\mfc120kor.dll msiexec.exe File created C:\Windows\system32\mfcm120u.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120rus.dll msiexec.exe File created C:\Windows\SysWOW64\vcamp120.dll msiexec.exe File opened for modification C:\Windows\system32\vcamp120.dll msiexec.exe File created C:\Windows\system32\mfc120ita.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcamp120.dll msiexec.exe File created C:\Windows\SysWOW64\msvcp120.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120deu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120ita.dll msiexec.exe File created C:\Windows\system32\mfc120u.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120.dll msiexec.exe File created C:\Windows\system32\msvcp120.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120.dll msiexec.exe File created C:\Windows\system32\mfc120esn.dll msiexec.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA vegas200.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_90B77F4A11E5ADF5202CC3D8C5DC4FBA vegas200.exe File opened for modification C:\Windows\SysWOW64\mfc120jpn.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120jpn.dll msiexec.exe File created C:\Windows\SysWOW64\msvcr120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120fra.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120enu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120chs.dll msiexec.exe File created C:\Windows\system32\mfcm120.dll msiexec.exe File created C:\Windows\SysWOW64\DLLDEV32i.dll msiexec.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_90B77F4A11E5ADF5202CC3D8C5DC4FBA vegas200.exe File created C:\Windows\SysWOW64\vcomp120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120chs.dll msiexec.exe File created C:\Windows\SysWOW64\mfcm120u.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm120.dll msiexec.exe File created C:\Windows\SysWOW64\mfcm120.dll msiexec.exe File created C:\Windows\SysWOW64\vccorlib120.dll msiexec.exe File opened for modification C:\Windows\system32\msvcr120.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120cht.dll msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Help Files\spconsoleopt4_deu.chm msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdateOnDemand.exe MicrosoftEdgeWebView2RuntimeInstallerX64.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\MAGIX Plugins\essentialFX\Presets\StereoDelay\[Sys] Ping Pong Delay for Pads.efx msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Protein\Resource\WhyUnlock_CZ.htm msiexec.exe File created C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Help Files\PluginWrapper.chm msiexec.exe File created C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Help Files\sfresfilter_x64_fra.chm msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_el.dll MicrosoftEdgeWebView2RuntimeInstallerX64.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\98.0.1108.43\Locales\sk.pak setup.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\MagixAiFx.ofx.bundle\Contents\Resources\MagixAiFx.pl-PL.xml msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\FileIO Plug-Ins\so4compoundplug\so4compoundplug.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\TitlesAndText.ofx.bundle\Contents\Resources\TitlesAndText.ko-KR.xml msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\MAGIX Plugins\essentialFX\Presets\Limiter\[Sys] Dance Limiter (Tight Bass).efx msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Microsoft.Extensions.Caching.Memory.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\ScriptPortal.MediaSoftware.TextGen.CoreGraphics.dll msiexec.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\98.0.1108.43\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\98.0.1108.43\Locales\it.pak setup.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\ofxRotation.ofx.bundle\Contents\Resources\gui.xml msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\MagixCVFx.ofx.bundle\Contents\Resources\MagixCVFx.zh-CN.xml msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU25F6.tmp\msedgeupdateres_nb.dll MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\98.0.1108.43\learning_tools.dll setup.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\Filters.ofx.bundle\Contents\Resources\Filters.pl-PL.xml msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\ofx360Stabilizer.ofx.bundle\Contents\Resources\ofx360Stabilizer.ru-RU.xml msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\ofxStitch.ofx.bundle\Contents\Resources\VegasOfxStitch.pl-PL.xml msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Icons\vmspeproject.ico msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\ProjectNotesHolder.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Icons\icon_veg.ico msiexec.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\98.0.1108.43\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\98.0.1108.43\Installer\setup.exe setup.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\Vfx1.ofx.bundle\Contents\Resources\AutoLooks\41.cube msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\fargo.pdd.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\FileIO Plug-Ins\mxfhdcamsrplug\mp4encoder_dll.dll msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_ca.dll MicrosoftEdgeWebView2RuntimeInstallerX64.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\Vfx1.ofx.bundle\Contents\Resources\AutoLooks\17.cube msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\MagixAiFx.ofx.bundle\Contents\Resources\MagixAiFx.zh-CN.xml msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\bdmux\Vegmuxmc.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OFX Video Plug-Ins\TitlesAndText.ofx.bundle\Contents\Presets\_msi_keyfile_eq2m05gkprao0pvbm37e3zc38 msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\MAGIX Plugins\essentialFX\Presets\Limiter\[Sys] Dance Limiter (Loud).efx msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Script Menu\Export Chapters.cs msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OpenColorIO.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Protein\Resource\UnlockDialog_TW.ini msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Protein\Forms\UnlockFormMail_hu_HU.rtf msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Protein\Forms\UnlockFormServiceCenter_zh_CN.rtf msiexec.exe File created C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Help Files\sfxpfx1_x64.chm msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\98.0.1108.43\Locales\fa.pak setup.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\MAGIX Plugins\essentialFX\Presets\ChorusFlanger\[Sys] Lush And Wide Open.efx msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\MAGIX Plugins\essentialFX\Presets\Phaser\[Sys] Phasing pad.efx msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\MAGIX Plugins\essentialFX\Presets\StereoDelay\[Sys] Sweet Echo Tripl..efx msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\FileIO Plug-Ins\mcmp4plug2\mc_open_cl\mc_config_avc.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Protein\Forms\UnlockFormFax_fr_CA.rtf msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\psuser_64.dll MicrosoftEdgeWebView2RuntimeInstallerX64.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\98.0.1108.43\Locales\te.pak setup.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\bdmux\BdmuxInterface.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\VEGASCapture\libGLESv2.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\FileIO Plug-Ins\mcmp4xavcs\mc_cpu\mc_enc_aac.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\VEGASCapture\LICENSES.chromium.html msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\FileIO Plug-Ins\mxfplug\mc_enc_pcm.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Bitmaps\MxAutoUpdate\Include\TDefaultFontDialog_.ini msiexec.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\98.0.1108.43\Locales\ro.pak setup.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\VEGASCapture\locales\fil.pak msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\OpenColorIO\configs\aces_1.2\luts\Log2_48_nits_Shaper.RRT.DCDM.spi3d msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\Online\cpprest120_2_6.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\fr\ScriptPortal.MediaSoftware.Archive.resources.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\fr\ScriptPortal.MediaSoftware.FileExplorer.resources.dll msiexec.exe File created C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200k.dll msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120ita_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120kor_x64 msiexec.exe File opened for modification C:\Windows\Installer\MSI43EA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8706.tmp msiexec.exe File created C:\Windows\Fonts\MarkMyWordsClean.otf msiexec.exe File created C:\Windows\Fonts\mocking_bird.otf msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E\12.0.40660\F_CENTRAL_vcamp120_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E\12.0.40660\F_CENTRAL_vccorlib120_x86 msiexec.exe File opened for modification C:\Windows\Installer\MSI756F.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5b46b1.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3EAF.tmp msiexec.exe File created C:\Windows\Fonts\beyond_the_mountains.otf msiexec.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\ef0-0\System.ServiceModel.Internals.dll mscorsvw.exe File created C:\Windows\Fonts\hotel_de_paris_Xe.otf msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E\12.0.40660\F_CENTRAL_msvcp120_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120kor_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570\12.0.40660\F_CENTRAL_vccorlib120_x64 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120ita_x64 msiexec.exe File opened for modification C:\Windows\Installer\e5b46d4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI93A3.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120deu_x86 msiexec.exe File opened for modification C:\Windows\Installer\MSI953E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI996B.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120chs_x64 msiexec.exe File opened for modification C:\Windows\Installer\MSIA3B1.tmp msiexec.exe File created C:\Windows\Fonts\Broadcast_Matter.otf msiexec.exe File created C:\Windows\Fonts\the_breakdown.otf msiexec.exe File opened for modification C:\Windows\Installer\MSIFE0D.tmp msiexec.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.VisualC\82b1ae8cba204aa301aa01544206ca58\Microsoft.VisualC.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Vegmuxfa\70e6f32d8d2c6489994ad20361348676\Vegmuxfa.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Vegmuxrt\cb7cfbfeadbdebadf56483ad824c0d55\Vegmuxrt.ni.dll.aux.tmp mscorsvw.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120chs_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570\12.0.40660 msiexec.exe File created C:\Windows\Fonts\huntress.otf msiexec.exe File created C:\Windows\Fonts\work_in_progress.otf msiexec.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\770-0\System.Web.Services.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\b14-0\Vegmuxdh.dll mscorsvw.exe File created C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570\12.0.40660\F_CENTRAL_msvcr120_x64 msiexec.exe File opened for modification C:\Windows\Installer\MSI959D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA3F0.tmp msiexec.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Vegmuxfc\1d319b9f3e81ad25061051b67820a1b4\Vegmuxfc.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120u_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfcm120_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\CE6380BC270BD863282B3D74B09F7570\CacheSize.txt msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120ita_x64 msiexec.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\SMDiagnostics\9d5e180be6e720fe412329f585d8fd4b\SMDiagnostics.ni.dll.aux.tmp mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.log ngen.exe File created C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120enu_x86 msiexec.exe File created C:\Windows\Fonts\MarkMyWords.otf msiexec.exe File created C:\Windows\Fonts\Wasted.otf msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\12B8D03ED28D112328CCF0A0D541598E\12.0.40660\F_CENTRAL_vcamp120_x86 msiexec.exe File opened for modification C:\Windows\Installer\MSIF3D7.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120fra_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\44DB0475D85BA123FA0CD6D35465DDC6\12.0.40660\F_CENTRAL_mfc120enu_x64 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120jpn_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfcm120u_x86 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\CacheSize.txt msiexec.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\ddc-0\System.EnterpriseServices.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\af8-0\System.Runtime.Serialization.Formatters.Soap.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\d84-0\Vegmuxtw.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\ec0-0\System.Drawing.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing\162a2eca8d47893f9ac874aca32e913a\System.Drawing.ni.dll.aux.tmp mscorsvw.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfc120u_x86 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\8520DAD7C5154DD39846DB1714990E7F\12.0.40660\F_CENTRAL_mfcm120u_x86 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1F msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software vegas200.exe Key created \REGISTRY\USER\.DEFAULT\CLSID\{8BF0126F-A5B7-4720-ABB2-2414A0AF5474}\9696d3542e95cfc6aa847d9097b88154 vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates vegas200.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\23 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Magix\MagixOFA\Internet_Settings vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA vegas200.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\VEGAS Creative Software\VEGAS Pro\20.0\Metrics\Application\700 = "0" vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\VEGAS Creative Software\VEGAS Pro\20.0 vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\CLSID\{8BF0126F-A5B7-4720-ABB2-2414A0AF5474} vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\CLSID\{8BF0126F-A5B7-4720-ABB2-2414A0AF5474}\9696d3542e95cfc6aa847d9097b88154\CID = "7c07ccaa-6eb0-4225-ae1e-4a3e464ff1b5" vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\21 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\VEGAS Creative Software\VEGAS Pro\20.0\Metrics\Application vegas200.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\VEGAS Creative Software\VEGAS Pro\20.0\Metrics\Application\701 = "0" vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Magix\MagixOFA vegas200.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\24 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed vegas200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs vegas200.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\20 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\22 msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{61087a79-ac85-455c-934d-1fa22cc64f36} vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54F29260-79B1-11D0-AEBC-00A0C9053912}\InprocServer32\ThreadingModel = "Both" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7298A3E0-78EE-11D0-AEBC-00A0C9053912}\Merit = "2097152" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539F1A5A-1A2F-4CFD-A2DA-FB645E9D465B}\P3Data = "#d60U/WobnGxOGIluEevO6iXf2gExxKzcLyGg7IynARsFJopEnC7O+XhN8dE+RlDiBAvv5AmtY+YJn/Y5Mel8BQPWEjT7iMfBDEZmHj1+/zuymrjfbPLCNVoe9kvyEvy8p9SzksJlflGHccV98gdfrQ==" vegas200.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F09F6981-7845-11D0-AEBC-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack3_x64.dll" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5D22D5B4-96F3-4061-8EE5-72D35A140205} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{824AFE10-2098-4254-B2C3-00A0C9053912}\ = "VEGAS Resonant Filter Prop Page" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{39224540-6F92-11D0-AEBC-00A0C9053912} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0000000B-0F56-11D2-9887-00A0C969725B}\InprocServer32\ThreadingModel = "Both" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass.1\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00000002-0F56-11D2-9887-00A0C969725B}\Pins\Input\IsRendered = "0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.CoreMachineClass" MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{EB6213DB-08FF-4510-9F8D-3058B0ECE4C6}\FilterData = 0200000000002000020000000000000030706933000000000000000001000000000000000000000030747933000000006000000070000000317069330800000000000000010000000000000000000000307479330000000060000000700000006175647300001000800000aa00389b7100000000000000000000000000000000 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Filter\{00000006-0F56-11D2-9887-00A0C969725B} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3F901A21-79BE-11D0-AEBC-00A0C9053912}\InprocServer32 MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FDB0D300-6F82-11D0-AEBC-00A0C9053912}\Pins\Input\AllowedMany = "0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12 vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D169104D02A37CA349B316935DDB94A0\SourceList\PackageName = "vc_runtimeAdditional_x86.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{026D0AA0-9BB9-11D0-AEBC-00A0C9053912}\InprocServer32 ngen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F3B8E880-B4E0-11D0-AEBC-00A0C9053912}\Pins\Input\Types\{73647561-0000-0010-8000-00AA00389B71} ngen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CLSID\ = "{8F09CD6C-5964-4573-82E3-EBFF7702865B}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D616F3E0-D622-11CE-AAC5-0020AF0B99A3}\Pins\Input\Types\{73647561-0000-0010-8000-00AA00389B71} ngen.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23C9F225-40EC-11D2-9D36-00C04F8EDC1E}\Merit = "2097152" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3898D8A0-A9A3-4B80-BDC2-DF400AF0DD3C}\ID1 = "2621331717" vegas200.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1BAD2218D4DE6763BBA0AC63186945E3\SourceList\Net\1 = "C:\\ProgramData\\Package Cache\\{8122DAB1-ED4D-3676-BB0A-CA368196543E}v12.0.40664\\packages\\vcRuntimeMinimum_x86\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA97FC2A-0F62-11D2-9887-00A0C969725B} mscorsvw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54F29260-79B1-11D0-AEBC-00A0C9053912}\InprocServer32\ = "C:\\Program Files (x86)\\VEGAS\\Shared Plug-Ins\\Audio_x64\\sfppack1_x64.dll" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{00000004-0F56-11D2-9887-00A0C969725B}\FriendlyName = "VEGAS ExpressFX Flange/Wah-Wah" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00000004-0F56-11D2-9887-00A0C969725B}\Pins\Input\AllowedZero = "0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C} MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3804 chrome.exe 3804 chrome.exe 3684 chrome.exe 3684 chrome.exe 3820 chrome.exe 3820 chrome.exe 4316 chrome.exe 4316 chrome.exe 3360 chrome.exe 3360 chrome.exe 5004 chrome.exe 5004 chrome.exe 4584 chrome.exe 4584 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 3176 chrome.exe 3176 chrome.exe 1852 chrome.exe 1852 chrome.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 3728 msiexec.exe 4480 MicrosoftEdgeUpdate.exe 4480 MicrosoftEdgeUpdate.exe 3920 chrome.exe 3920 chrome.exe 4480 MicrosoftEdgeUpdate.exe 4480 MicrosoftEdgeUpdate.exe 4480 MicrosoftEdgeUpdate.exe 4480 MicrosoftEdgeUpdate.exe 3728 msiexec.exe 3728 msiexec.exe 2228 chrome.exe 2228 chrome.exe 1204 chrome.exe 1204 chrome.exe 1532 DllHost.exe 1532 DllHost.exe 3188 MicrosoftEdgeUpdate.exe 3188 MicrosoftEdgeUpdate.exe 3096 MicrosoftEdgeUpdate.exe 3096 MicrosoftEdgeUpdate.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3860 osk.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3728 msiexec.exe Token: SeCreateTokenPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeAssignPrimaryTokenPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeLockMemoryPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeIncreaseQuotaPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeMachineAccountPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeTcbPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeSecurityPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeTakeOwnershipPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeLoadDriverPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeSystemProfilePrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeSystemtimePrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeProfSingleProcessPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeIncBasePriorityPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeCreatePagefilePrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeCreatePermanentPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeBackupPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeRestorePrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeShutdownPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeDebugPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeAuditPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeSystemEnvironmentPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeChangeNotifyPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeRemoteShutdownPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeUndockPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeSyncAgentPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeEnableDelegationPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeManageVolumePrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeImpersonatePrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeCreateGlobalPrivilege 2780 VEGAS_Pro_20_setup.exe Token: SeBackupPrivilege 1596 vssvc.exe Token: SeRestorePrivilege 1596 vssvc.exe Token: SeAuditPrivilege 1596 vssvc.exe Token: 33 1924 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1924 AUDIODG.EXE Token: SeShutdownPrivilege 3384 vcredist_x86.exe Token: SeIncreaseQuotaPrivilege 3384 vcredist_x86.exe Token: SeCreateTokenPrivilege 3384 vcredist_x86.exe Token: SeAssignPrimaryTokenPrivilege 3384 vcredist_x86.exe Token: SeLockMemoryPrivilege 3384 vcredist_x86.exe Token: SeIncreaseQuotaPrivilege 3384 vcredist_x86.exe Token: SeMachineAccountPrivilege 3384 vcredist_x86.exe Token: SeTcbPrivilege 3384 vcredist_x86.exe Token: SeSecurityPrivilege 3384 vcredist_x86.exe Token: SeTakeOwnershipPrivilege 3384 vcredist_x86.exe Token: SeLoadDriverPrivilege 3384 vcredist_x86.exe Token: SeSystemProfilePrivilege 3384 vcredist_x86.exe Token: SeSystemtimePrivilege 3384 vcredist_x86.exe Token: SeProfSingleProcessPrivilege 3384 vcredist_x86.exe Token: SeIncBasePriorityPrivilege 3384 vcredist_x86.exe Token: SeCreatePagefilePrivilege 3384 vcredist_x86.exe Token: SeCreatePermanentPrivilege 3384 vcredist_x86.exe Token: SeBackupPrivilege 3384 vcredist_x86.exe Token: SeRestorePrivilege 3384 vcredist_x86.exe Token: SeShutdownPrivilege 3384 vcredist_x86.exe Token: SeDebugPrivilege 3384 vcredist_x86.exe Token: SeAuditPrivilege 3384 vcredist_x86.exe Token: SeSystemEnvironmentPrivilege 3384 vcredist_x86.exe Token: SeChangeNotifyPrivilege 3384 vcredist_x86.exe Token: SeRemoteShutdownPrivilege 3384 vcredist_x86.exe Token: SeUndockPrivilege 3384 vcredist_x86.exe Token: SeSyncAgentPrivilege 3384 vcredist_x86.exe Token: SeEnableDelegationPrivilege 3384 vcredist_x86.exe Token: SeManageVolumePrivilege 3384 vcredist_x86.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5052 VEGAS_Pro_20.0.0.214.exe 2780 VEGAS_Pro_20_setup.exe 3860 osk.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5052 VEGAS_Pro_20.0.0.214.exe 5052 VEGAS_Pro_20.0.0.214.exe 5052 VEGAS_Pro_20.0.0.214.exe 5052 VEGAS_Pro_20.0.0.214.exe 2780 VEGAS_Pro_20_setup.exe 2780 VEGAS_Pro_20_setup.exe 2780 VEGAS_Pro_20_setup.exe 2780 VEGAS_Pro_20_setup.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 4504 vegas200.exe 4504 vegas200.exe 3860 osk.exe 3860 osk.exe 5116 DllHost.exe 5116 DllHost.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 1532 DllHost.exe 1532 DllHost.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe 3860 osk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2780 5052 VEGAS_Pro_20.0.0.214.exe 123 PID 5052 wrote to memory of 2780 5052 VEGAS_Pro_20.0.0.214.exe 123 PID 5052 wrote to memory of 2780 5052 VEGAS_Pro_20.0.0.214.exe 123 PID 3752 wrote to memory of 3992 3752 elevation_service.exe 134 PID 3752 wrote to memory of 3992 3752 elevation_service.exe 134 PID 3752 wrote to memory of 3992 3752 elevation_service.exe 134 PID 2780 wrote to memory of 3384 2780 VEGAS_Pro_20_setup.exe 164 PID 2780 wrote to memory of 3384 2780 VEGAS_Pro_20_setup.exe 164 PID 2780 wrote to memory of 3384 2780 VEGAS_Pro_20_setup.exe 164 PID 3384 wrote to memory of 2656 3384 vcredist_x86.exe 165 PID 3384 wrote to memory of 2656 3384 vcredist_x86.exe 165 PID 3384 wrote to memory of 2656 3384 vcredist_x86.exe 165 PID 3384 wrote to memory of 2932 3384 vcredist_x86.exe 180 PID 3384 wrote to memory of 2932 3384 vcredist_x86.exe 180 PID 3384 wrote to memory of 2932 3384 vcredist_x86.exe 180 PID 2932 wrote to memory of 3012 2932 vcredist_x86.exe 181 PID 2932 wrote to memory of 3012 2932 vcredist_x86.exe 181 PID 2932 wrote to memory of 3012 2932 vcredist_x86.exe 181 PID 2780 wrote to memory of 3180 2780 VEGAS_Pro_20_setup.exe 184 PID 2780 wrote to memory of 3180 2780 VEGAS_Pro_20_setup.exe 184 PID 2780 wrote to memory of 3180 2780 VEGAS_Pro_20_setup.exe 184 PID 3180 wrote to memory of 1372 3180 vcredist_x64.exe 185 PID 3180 wrote to memory of 1372 3180 vcredist_x64.exe 185 PID 3180 wrote to memory of 1372 3180 vcredist_x64.exe 185 PID 3180 wrote to memory of 3020 3180 vcredist_x64.exe 186 PID 3180 wrote to memory of 3020 3180 vcredist_x64.exe 186 PID 3180 wrote to memory of 3020 3180 vcredist_x64.exe 186 PID 3020 wrote to memory of 4324 3020 vcredist_x64.exe 187 PID 3020 wrote to memory of 4324 3020 vcredist_x64.exe 187 PID 3020 wrote to memory of 4324 3020 vcredist_x64.exe 187 PID 2780 wrote to memory of 1532 2780 VEGAS_Pro_20_setup.exe 189 PID 2780 wrote to memory of 1532 2780 VEGAS_Pro_20_setup.exe 189 PID 2780 wrote to memory of 1532 2780 VEGAS_Pro_20_setup.exe 189 PID 1532 wrote to memory of 4480 1532 MicrosoftEdgeWebView2RuntimeInstallerX64.exe 191 PID 1532 wrote to memory of 4480 1532 MicrosoftEdgeWebView2RuntimeInstallerX64.exe 191 PID 1532 wrote to memory of 4480 1532 MicrosoftEdgeWebView2RuntimeInstallerX64.exe 191 PID 4480 wrote to memory of 5100 4480 MicrosoftEdgeUpdate.exe 192 PID 4480 wrote to memory of 5100 4480 MicrosoftEdgeUpdate.exe 192 PID 4480 wrote to memory of 5100 4480 MicrosoftEdgeUpdate.exe 192 PID 4480 wrote to memory of 1800 4480 MicrosoftEdgeUpdate.exe 193 PID 4480 wrote to memory of 1800 4480 MicrosoftEdgeUpdate.exe 193 PID 4480 wrote to memory of 1800 4480 MicrosoftEdgeUpdate.exe 193 PID 1800 wrote to memory of 3020 1800 MicrosoftEdgeUpdate.exe 194 PID 1800 wrote to memory of 3020 1800 MicrosoftEdgeUpdate.exe 194 PID 1800 wrote to memory of 3500 1800 MicrosoftEdgeUpdate.exe 195 PID 1800 wrote to memory of 3500 1800 MicrosoftEdgeUpdate.exe 195 PID 1800 wrote to memory of 2168 1800 MicrosoftEdgeUpdate.exe 196 PID 1800 wrote to memory of 2168 1800 MicrosoftEdgeUpdate.exe 196 PID 4480 wrote to memory of 4524 4480 MicrosoftEdgeUpdate.exe 197 PID 4480 wrote to memory of 4524 4480 MicrosoftEdgeUpdate.exe 197 PID 4480 wrote to memory of 4524 4480 MicrosoftEdgeUpdate.exe 197 PID 4480 wrote to memory of 4108 4480 MicrosoftEdgeUpdate.exe 199 PID 4480 wrote to memory of 4108 4480 MicrosoftEdgeUpdate.exe 199 PID 4480 wrote to memory of 4108 4480 MicrosoftEdgeUpdate.exe 199 PID 4432 wrote to memory of 3492 4432 MicrosoftEdgeUpdate.exe 201 PID 4432 wrote to memory of 3492 4432 MicrosoftEdgeUpdate.exe 201 PID 4432 wrote to memory of 3492 4432 MicrosoftEdgeUpdate.exe 201 PID 4432 wrote to memory of 4572 4432 MicrosoftEdgeUpdate.exe 202 PID 4432 wrote to memory of 4572 4432 MicrosoftEdgeUpdate.exe 202 PID 4572 wrote to memory of 3924 4572 MicrosoftEdgeWebview_X64_98.0.1108.43.exe 203 PID 4572 wrote to memory of 3924 4572 MicrosoftEdgeWebview_X64_98.0.1108.43.exe 203 PID 4432 wrote to memory of 3964 4432 MicrosoftEdgeUpdate.exe 208 PID 4432 wrote to memory of 3964 4432 MicrosoftEdgeUpdate.exe 208 PID 4432 wrote to memory of 3964 4432 MicrosoftEdgeUpdate.exe 208
Processes
-
C:\Users\Admin\AppData\Local\Temp\VEGAS_Pro_20.0.0.214.exe"C:\Users\Admin\AppData\Local\Temp\VEGAS_Pro_20.0.0.214.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup.exe"C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup.exe" -m C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\SetupValues.dat2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86.txt"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86.txt" -burn.unelevated BurnPipe.{2C287DA5-EE89-4971-A055-FEAA6238649F} {9FA66531-30CD-4E75-A764-218A39157436} 33844⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656
-
-
C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe"C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} -burn.embedded BurnPipe.{3061852B-01AC-416D-81BE-1F3A9889C9DD} {B458A833-9A5A-4AD8-AF63-9DCC49A9F76A} 33844⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe"C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} -burn.embedded BurnPipe.{3061852B-01AC-416D-81BE-1F3A9889C9DD} {B458A833-9A5A-4AD8-AF63-9DCC49A9F76A} 3384 -burn.unelevated BurnPipe.{C51F5EA0-BC09-4999-94B6-0A9C0E5ABD51} {3DC1E8CF-5ACB-46F7-8138-82C85E1AF9F0} 29325⤵
- Loads dropped DLL
PID:3012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64.txt"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64.txt" -burn.unelevated BurnPipe.{53FAFD5A-AAB4-42CF-B371-B6736FC95254} {558276E9-B848-48C4-9923-78D394956D40} 31804⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372
-
-
C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe"C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={042d26ef-3dbe-4c25-95d3-4c1b11b235a7} -burn.embedded BurnPipe.{C2606C37-B0C8-4622-8ADB-82AA95471176} {2E31CDBF-8633-4AB6-B5EC-85AA1BEAE196} 31804⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe"C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={042d26ef-3dbe-4c25-95d3-4c1b11b235a7} -burn.embedded BurnPipe.{C2606C37-B0C8-4622-8ADB-82AA95471176} {2E31CDBF-8633-4AB6-B5EC-85AA1BEAE196} 3180 -burn.unelevated BurnPipe.{58335AA9-CED9-4D5B-9C40-2A74BDAFD948} {A6D31C12-184B-4EAD-9C66-632DCEDDE420} 30205⤵
- Loads dropped DLL
PID:4324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe"C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe" /silent /install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20WebView2%20Runtime&needsadmin=Prefers"4⤵
- Executes dropped EXE
- Sets file execution options in registry
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5100
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:3020
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:3500
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:2168
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTcwRkIxREUtNTRDNS00NDlFLUE1RjctQ0FCMzM1MDg4ODlDfSIgdXNlcmlkPSJ7OTA4RUJBOTMtQTY3Ri00MzRDLUI3RDItMzE3RTExRTM1OTI1fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsyRENDQkM4MC1CRTIxLTRGMEUtOThBMy1GNEJFQURCQTI0MTh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtxV0pTeld3UGZkY0xSK1hHSXY2eHJaZmlZT3hoUFUyczFOV21qV2NhRlBnPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTcxLjM3IiBuZXh0dmVyc2lvbj0iMS4zLjE1NS43NyIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxMDEzIi8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4524
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20WebView2%20Runtime&needsadmin=Prefers" /installsource offline /sessionid "{170FB1DE-54C5-449E-A5F7-CAB33508889C}" /silent /offlinedir "{94815580-D483-4430-9F13-F437C3AACBF6}"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4108
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1700 /prefetch:21⤵PID:1340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2020 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2476 /prefetch:81⤵PID:220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2832 /prefetch:11⤵PID:3032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:11⤵PID:2536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:11⤵PID:1136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4512 /prefetch:81⤵PID:1376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4508 /prefetch:81⤵PID:4220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4636 /prefetch:81⤵PID:960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4812 /prefetch:81⤵PID:4068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4820 /prefetch:81⤵PID:4052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4844 /prefetch:81⤵PID:2348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:81⤵PID:3708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4744 /prefetch:81⤵PID:3856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4668 /prefetch:81⤵PID:1376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4568 /prefetch:81⤵PID:2312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4832 /prefetch:81⤵PID:1612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5332 /prefetch:81⤵PID:3532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5256 /prefetch:81⤵PID:4584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4908 /prefetch:81⤵PID:2356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4464 /prefetch:11⤵PID:2792
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:11⤵PID:4752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:11⤵PID:2168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3136 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4684 /prefetch:81⤵PID:4916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2284 /prefetch:81⤵PID:1612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3812 /prefetch:81⤵PID:3448
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3752_793224941\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3752_793224941\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={12653912-b8c1-4c12-8ae5-40073c18c912} --system2⤵
- Executes dropped EXE
PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3560 /prefetch:81⤵PID:1272
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4020 /prefetch:21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:11⤵PID:3916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5356 /prefetch:81⤵PID:3920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5348 /prefetch:81⤵PID:4800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:11⤵PID:4420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:11⤵PID:2348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:11⤵PID:1256
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:11⤵PID:3588
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5544 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2132 /prefetch:81⤵PID:4728
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=812 /prefetch:11⤵PID:3928
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:11⤵PID:3464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5644 /prefetch:81⤵PID:4648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4836 /prefetch:81⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2440 /prefetch:11⤵PID:4344
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:11⤵PID:1700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3864 /prefetch:81⤵PID:4792
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4876 /prefetch:81⤵PID:2240
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:11⤵PID:4992
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2720 /prefetch:11⤵PID:3852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5288 /prefetch:81⤵PID:1128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5544 /prefetch:81⤵PID:2820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=896 /prefetch:81⤵PID:3272
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5196 /prefetch:81⤵PID:1400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3028 /prefetch:81⤵PID:2872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5664 /prefetch:81⤵PID:5016
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D2A5E96CCBD8D52A639F1F39711744642⤵
- Loads dropped DLL
PID:4524
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 32502A4DF2A1C6EE191DCB1CD3DED1EE E Global\MSI00002⤵
- Loads dropped DLL
PID:1004 -
C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe"C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe" /register /user 10853⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4504 -
C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe"C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe"4⤵
- Executes dropped EXE
PID:3324
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "C:\Program Files\VEGAS\VEGAS Pro 20.0\bdmux\BdmuxServer.exe"3⤵
- Registers COM server for autorun
- Modifies registry class
PID:3092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 0 -NGENProcess 1f8 -Pipe 204 -Comment "NGen Worker Process"4⤵PID:2680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 290 -Pipe 2a0 -Comment "NGen Worker Process"4⤵PID:4052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 0 -NGENProcess 218 -Pipe 2a4 -Comment "NGen Worker Process"4⤵PID:4612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 2c4 -Pipe 2d8 -Comment "NGen Worker Process"4⤵PID:536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 0 -NGENProcess 2f4 -Pipe 304 -Comment "NGen Worker Process"4⤵PID:3272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 208 -Pipe 2e4 -Comment "NGen Worker Process"4⤵PID:1260
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 0 -NGENProcess 2c4 -Pipe 2e0 -Comment "NGen Worker Process"4⤵PID:3472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 0 -NGENProcess 2fc -Pipe 2c4 -Comment "NGen Worker Process"4⤵PID:4572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 0 -NGENProcess 28c -Pipe 2fc -Comment "NGen Worker Process"4⤵PID:1204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 0 -NGENProcess 328 -Pipe 314 -Comment "NGen Worker Process"4⤵PID:4088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 318 -Pipe 28c -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:3548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 0 -NGENProcess 324 -Pipe 300 -Comment "NGen Worker Process"4⤵PID:1748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 0 -NGENProcess 32c -Pipe 348 -Comment "NGen Worker Process"4⤵PID:4692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 0 -NGENProcess 330 -Pipe 33c -Comment "NGen Worker Process"4⤵PID:1180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 330 -Pipe 310 -Comment "NGen Worker Process"4⤵PID:3776
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 0 -NGENProcess 318 -Pipe 2f4 -Comment "NGen Worker Process"4⤵PID:4292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 0 -NGENProcess 344 -Pipe 30c -Comment "NGen Worker Process"4⤵PID:1256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 0 -NGENProcess 34c -Pipe 31c -Comment "NGen Worker Process"4⤵PID:1532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 0 -NGENProcess 354 -Pipe 218 -Comment "NGen Worker Process"4⤵PID:3684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 368 -Pipe 36c -Comment "NGen Worker Process"4⤵PID:1128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 0 -NGENProcess 208 -Pipe 320 -Comment "NGen Worker Process"4⤵PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 0 -NGENProcess 378 -Pipe 358 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:3776
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 0 -NGENProcess 334 -Pipe 364 -Comment "NGen Worker Process"4⤵PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 344 -Pipe 360 -Comment "NGen Worker Process"4⤵PID:3096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 0 -NGENProcess 324 -Pipe 344 -Comment "NGen Worker Process"4⤵PID:1260
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 0 -NGENProcess 330 -Pipe 29c -Comment "NGen Worker Process"4⤵PID:3684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 0 -NGENProcess 328 -Pipe 324 -Comment "NGen Worker Process"4⤵PID:4648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 0 -NGENProcess 384 -Pipe 34c -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 384 -Pipe 308 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:3824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 0 -NGENProcess 334 -Pipe 2b0 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:2536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 0 -NGENProcess 290 -Pipe 330 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:1904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 0 -NGENProcess 32c -Pipe 334 -Comment "NGen Worker Process"4⤵PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 0 -NGENProcess 290 -Pipe 35c -Comment "NGen Worker Process"4⤵PID:3468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 0 -NGENProcess 384 -Pipe 378 -Comment "NGen Worker Process"4⤵PID:2220
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 0 -NGENProcess 328 -Pipe 350 -Comment "NGen Worker Process"4⤵PID:3128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 2f8 -Pipe 338 -Comment "NGen Worker Process"4⤵PID:1256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 0 -NGENProcess 37c -Pipe 368 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:2964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 354 -Pipe 384 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 0 -NGENProcess 32c -Pipe 208 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:3948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 0 -NGENProcess 374 -Pipe 354 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:1508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 328 -Pipe 318 -Comment "NGen Worker Process"4⤵PID:1620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 0 -NGENProcess 290 -Pipe 398 -Comment "NGen Worker Process"4⤵PID:2588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 37c -Pipe 38c -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
PID:3460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 0 -NGENProcess 290 -Pipe 3b4 -Comment "NGen Worker Process"4⤵
- Registers COM server for autorun
- Drops file in Windows directory
- Modifies registry class
PID:964
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe update /queue3⤵
- Drops file in Windows directory
PID:2576
-
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\VEGAS\VEGAS Pro 20.0\sfvstwrap.dll"2⤵
- Loads dropped DLL
PID:2164
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\mchammer_x64.dll"2⤵
- Registers COM server for autorun
- Loads dropped DLL
PID:3492
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sffrgpnv_x64.dll"2⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:1648
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfppack1_x64.dll"2⤵
- Registers COM server for autorun
- Modifies registry class
PID:4668
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfppack2_x64.dll"2⤵PID:3092
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfppack3_x64.dll"2⤵
- Registers COM server for autorun
- Modifies registry class
PID:3732
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfresfilter_x64.dll"2⤵
- Registers COM server for autorun
- Modifies registry class
PID:3348
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sftrkfx1_x64.dll"2⤵
- Registers COM server for autorun
- Modifies registry class
PID:4436
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfxpfx1_x64.dll"2⤵
- Registers COM server for autorun
- Modifies registry class
PID:3376
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfxpfx2_x64.dll"2⤵PID:964
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfxpfx3_x64.dll"2⤵PID:4908
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\xpvinyl_x64.dll"2⤵
- Registers COM server for autorun
PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:11⤵PID:2776
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:11⤵PID:1704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:11⤵PID:4768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:11⤵PID:3824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:11⤵PID:1608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 /prefetch:81⤵PID:824
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5464 /prefetch:81⤵PID:4004
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵PID:4412
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5636 /prefetch:81⤵PID:4644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2364 /prefetch:81⤵PID:2104
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTcwRkIxREUtNTRDNS00NDlFLUE1RjctQ0FCMzM1MDg4ODlDfSIgdXNlcmlkPSJ7OTA4RUJBOTMtQTY3Ri00MzRDLUI3RDItMzE3RTExRTM1OTI1fSIgaW5zdGFsbHNvdXJjZT0ib2ZmbGluZSIgcmVxdWVzdGlkPSJ7MEY2MUE0REUtNDExNS00MzMxLTk4RkItM0NGRUFDRUQ2OThFfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJEQURZIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iODkuMC40Mzg5LjExNCIgbmV4dHZlcnNpb249Ijg5LjAuNDM4OS4xMTQiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjYzIiBpbnN0YWxsZGF0ZT0iLTQiIGluc3RhbGxkYXRldGltZT0iMTY2ODE3NDY3MSI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjMiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3492
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\MicrosoftEdgeWebview_X64_98.0.1108.43.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\MicrosoftEdgeWebview_X64_98.0.1108.43.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\EDGEMITMP_54B07.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\EDGEMITMP_54B07.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\EDGEMITMP_54B07.tmp\MSEDGE.PACKED.7Z" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:3924
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NjA4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMiIgZG93bmxvYWRlZD0iMTE3Mjc4MTEyIiB0b3RhbD0iMTE3Mjc4MTEyIiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMSIgaW5zdGFsbF90aW1lX21zPSIxOTA2NyIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3964
-
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3860
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:11⤵PID:5080
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}1⤵
- Suspicious use of SetWindowsHookEx
PID:5116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5780 /prefetch:81⤵PID:1080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5920 /prefetch:81⤵PID:4644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3036 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:81⤵PID:1532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5780 /prefetch:81⤵PID:3492
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2288 /prefetch:81⤵
- Registers COM server for autorun
- Modifies registry class
PID:4908
-
C:\Users\Admin\Downloads\vegas200.exe"C:\Users\Admin\Downloads\vegas200.exe"1⤵PID:3048
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1532
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2884
-
C:\Users\Admin\Downloads\vegas200.exe"C:\Users\Admin\Downloads\vegas200.exe"1⤵PID:1684
-
C:\Users\Admin\Downloads\vegas200.exe"C:\Users\Admin\Downloads\vegas200.exe"1⤵PID:2716
-
C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe"C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe"1⤵
- Executes dropped EXE
- Modifies registry class
PID:4128 -
C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe"C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe"2⤵
- Executes dropped EXE
PID:2896
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
PID:2412
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3188 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{22A06767-4264-4767-B1AE-CB065F108DEB}\MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{22A06767-4264-4767-B1AE-CB065F108DEB}\MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe" /update /sessionid "{A9B095B8-C0F7-4823-B589-52E1C6485743}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3976 -
C:\Program Files (x86)\Microsoft\Temp\EU25F6.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU25F6.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{A9B095B8-C0F7-4823-B589-52E1C6485743}"3⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
PID:3096 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Modifies registry class
PID:3772
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Modifies registry class
PID:4804 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:5100
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:916
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:4640
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTU1Ljc3IiBuZXh0dmVyc2lvbj0iMS4zLjE3MS4zOSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTY3MzYzNTM3NyI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTEwNDg5MDE0MjgiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
PID:2680
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTlCMDk1QjgtQzBGNy00ODIzLUI1ODktNTJFMUM2NDg1NzQzfSIgdXNlcmlkPSJ7OTA4RUJBOTMtQTY3Ri00MzRDLUI3RDItMzE3RTExRTM1OTI1fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins4Mzk1RDM4Ni0wNTIwLTQ0NTAtQTI2NC0xNkI4N0MwRjZEQUN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTU1Ljc3IiBuZXh0dmVyc2lvbj0iMS4zLjE3MS4zOSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJQcm9kdWN0c1RvUmVnaXN0ZXI9JTdCRjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1JTdEIiBpbnN0YWxsYWdlPSIwIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjEyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-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-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-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0iezE1QzRBODYxLTQyMzQtNDU4QS04MUU1LTkyQTE0M0UzRjE1NH0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
PID:4872
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
160KB
MD5cf9a26b458293978a908536927ec327d
SHA1e8b293e3799f352921c7f430648c21f79e47b052
SHA2564faa7cd71e234433f684c3d70efbfb1ada8d4172fc55caf78c0705e5646b0ba9
SHA51254447d830595fd5e4cb8ff60e78916b676f983033397932fc0ff402cc310771d9e448cebdb1bcae6e0dd3d90c8968df01171ac52a1e14a36eda950f67909e714
-
Filesize
209KB
MD50032498af2ebc50357cb31f1024c87fb
SHA19818522c47ec379ff7bddf92ea72cd831691d094
SHA256c6bdf041b02561700c71c6275df4704a52d1fed4ba6a1bec98a602c6c325d6e7
SHA512f83fc43ca54e87a67d949666ca8c30721f372312042be978b01dcdccd530ce5db4d3d9d6ddc934a92c079825b91fd988f362cd481dd87fa09ddf2cfac85c05c3
-
Filesize
209KB
MD50032498af2ebc50357cb31f1024c87fb
SHA19818522c47ec379ff7bddf92ea72cd831691d094
SHA256c6bdf041b02561700c71c6275df4704a52d1fed4ba6a1bec98a602c6c325d6e7
SHA512f83fc43ca54e87a67d949666ca8c30721f372312042be978b01dcdccd530ce5db4d3d9d6ddc934a92c079825b91fd988f362cd481dd87fa09ddf2cfac85c05c3
-
Filesize
204KB
MD5cbb1acbff5a8ce79804e687be8e3e75e
SHA10bb50f813e08ff13d637a8f4ee66e4c0f1fb01ca
SHA2566d483505a0c9fd508ef48323099e2c64fce025e4b018df1d80d60aa00d8fb004
SHA5127f4a8df19f94c74b1898109804f4ec596abe32ff59d35279e58b139cf3210f6faa2697eca422435a193f4f2f90535187fcd233a018a54a0cfc426ced25de5ce8
-
Filesize
241KB
MD5f70b0fc2f46f5e7082817a11c39e3c54
SHA19939591b236bdd16ea02e79eb11a2d6fefe2af44
SHA256f6e636cfe7c53c120d834756f52ab407f1c5dc97c27a14e557f24c176e86d87f
SHA512b8bde38507eb84725aad9b7ffa33eae462fe6c7779f7ba650453b10bc9b52128198c4e29a568b0ba865fe266c19af81efc3f62a7ffd68e38e9d403d71b1afd79
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.5MB
MD500670be258aacf4ca0c01ca980e96354
SHA14ed09d74b4eb0cb5b95ab37e341025fb7081287c
SHA2560cb9d6c4fd45a3ba0f8e8c450e90beeee40e57b092906b841805fd3a24da4402
SHA51279a8e1c944d7e38087668db4052f604b4aabd605f7628e2b2fab8526a8001152b2b9e2e6d15f41e701df24e2e44077b0561b88f64de01ac5366a4d9e696cede1
-
Filesize
2.5MB
MD500670be258aacf4ca0c01ca980e96354
SHA14ed09d74b4eb0cb5b95ab37e341025fb7081287c
SHA2560cb9d6c4fd45a3ba0f8e8c450e90beeee40e57b092906b841805fd3a24da4402
SHA51279a8e1c944d7e38087668db4052f604b4aabd605f7628e2b2fab8526a8001152b2b9e2e6d15f41e701df24e2e44077b0561b88f64de01ac5366a4d9e696cede1
-
Filesize
27KB
MD50d8ca15cd08112472d8f725b9d26f400
SHA16082361001436a4d2c45babb755601a19bc58a10
SHA256a36ec679129d8fa6e3f56b37c88e7d3406bb4d6d74e559e5a272ac8f34a812f4
SHA5128ec03222c8a023fba580a309a487e4d9535cded212ce47aaf3d7f4cda250c99ce25417330e0508b0a306e0ba14f9451cda0a31c550fdf0ec92c192792af1e23b
-
Filesize
23KB
MD55b981b86b65935bae5fe5805660c7302
SHA11107f5a6b8bb4ed1e95f621fbb7b236d6a57e11c
SHA256bd380d64f5b9dd6bd979a78e912f1a3d2a7c08eda3418abc85d67c43c8477264
SHA512d00f6d92f0efa0c89ee042abcb8b583097cd173d80b8009fc9dcda98a25c73edab970d607b4993831577812335db49dd3d76dba64a4cd6adc7b57494f0f78766
-
Filesize
25KB
MD55e9ba26ad6068d5b12ee2ebd74d66c03
SHA12081cb86bbc6e20965b147f4178990f4c9ba52e7
SHA2566fc47a7fefb2ea88371b5e1ea84b24faaff6d4ccb503e6d9903b8301d16715e6
SHA512ab2eb6ae054cc107b83d877fc44dd62380c4098fbb805033c1d1f87d7172384c4cb7482d1f8931ad5f5b7dd181f6239748497e4b5866c2f406c310c6837028c4
-
Filesize
27KB
MD530a0dfc5374347d838199254ef2b27e1
SHA1739c8197c111eededbdfb8e1940e63188bd8c5be
SHA25692cc3b354e786d428ab3bb43c77119b81a2960b00bd9d99550639a8b5c0428b6
SHA512b8611af4595eea99fb45653f6419235368075664721c467753cedd3b71507a28e0d6c5fb2c4b3e01db56d4842c043b14e20ac1ae7c225e7d678c77befdfccd1d
-
Filesize
28KB
MD5da1dd46046721726b57bab405c7b7c49
SHA1f42267672f7112d772feee601d2add8346a0a89d
SHA256d699ca97e2bc94f0ecc95b2ccefed201786535e7ada3fd6ccb543f42cfc273b8
SHA512b71909c7df499a702b199b87a96d7f25fcc82a0dcbe1138e900b3f386a6204d1b95e37941f32f61a0a558ce2b514f938b0029c55da0e4955229863d8b4b40061
-
Filesize
28KB
MD59fbe7d6ef07bd3af76a9fc97dfd90e95
SHA1300ea110b9ec0ef6c754950ff4dd59dbfc9f2b23
SHA256fef5f9a3ac4626f756b28f6304dc5e5e50bff553930ff35d6b8429ee494b4313
SHA5120df3f0af13d5ed4291ba179846a741149807e073c767b90ab5fd50449879429de6dd2b43954b3a52d3cc77ef4c98dc9efcd594c17784b48c97bf5bdccc90cc97
-
Filesize
28KB
MD5583c93b26e5dcd4bab07f7d303ebf5c3
SHA1439e6d4762c2a3593512ff103a8ff32110fd0da3
SHA256c0bb2e9167995db0d8f1f69a202ba00529e2ead8daeb29fcb99d42b0613efb2f
SHA512aafbc518e596969d20327a2b860b63013b1d5bb7c89faacff0ba95a9f6bb160dffd5a0058475ec1ba2c5d07cfd8cd4a0cffe4bb89bd4bb74b3e5981d6beec414
-
Filesize
28KB
MD5fef17d66629715ae8ce4ab00464152ca
SHA1f62db519180eaaec0d62f56bf1dabcf353583aa6
SHA2562ee6f8216f4953f3101de9578b392e2de94d59a79d08cbdd327b3d433f2b70ee
SHA51298b2647b3bbb2476371fbf9329fad70934bcc7e1f958e925bbfca17a7083e47a5561db986d260025c339b051f7f00bcaaff938ff351032b95075bcc589b7255c
-
Filesize
27KB
MD5c359759bc31042b62167a40c7c0203b0
SHA121140ceadd92ab23835c0e7a8f2e2fb95d0ccbdf
SHA25643fe0258ad799cae8bb20f23c20d74fbbb4b650b97b1b5b737d1d1728556d897
SHA5121d5837ef553223ac09e93df362da460002fb4f9eccc19120c4fb8c29cd453139a3cef54e9514217ac2d862a423d7a82f3e3d9b09f00c611cb16f19dfbe90979f
-
Filesize
28KB
MD55928df4290e3b6e8676a5aac6ddbbc31
SHA1d83b71bc4b37c3b228b113239506f89761a55f7b
SHA256ac5f350f4dc790f61135186c113bb2b8a78f26dab322ddb86b0e3403ab960721
SHA51290113cfe50355d6df04382ee69db6ddad1651e771d0182e28d0d3de3d1d5a2f10d22d5de2b54e12bff1fa5d478513c881e9cfceb2b471746fa870516aa3d0e69
-
Filesize
28KB
MD5c2cc0764c763cd30ab629173ad2c9fdd
SHA10e681669c04e102a4b031378b38c2645dd42bb3e
SHA256f3b266910a5bc6f738c154cb6a754cb55df05ad7f01cd6d61cd6e0cc8927455e
SHA512f54ac389ea62f4c4af5cfd727be094d43976c53a84a1df4313fa5c81bdd9f7038ec9b13832abda95d6f496956383708b3828f41e4b746ebf645dbc343f6568e6
-
Filesize
27KB
MD5ebe48b47180b491688ec519a8d9bef73
SHA1bd98b11dbaef493968d999c22e2e35fdadcc51b2
SHA25602aae7715ad305977f316b9c80989ec63371c4c3e813b64252fe5f92143201d3
SHA5127b2b7204505d73ce66ad070bd31a7790dc56ef071bd233b7be3eb1ecf82a9cc30a605c0524c707d10a9828849de69a7169f8af5b7ea1c4da797deba89bcafc20
-
Filesize
27KB
MD5909c5c6afa14ee9756a4291077f2359b
SHA1819e5e4f3197a6f45b5ce461ebda5b8dcf5a9a8f
SHA2567b0b45ab3f199a316d33be841867e0e5219db63174efb5e6d9866816a3faf770
SHA512a7b75854111e769dbfc0fef86e6561aff12b883c34cd91d15a2f209c68d76412670e9ca732ca159bab42176a4c3f1d9707f8e9db5e21143c15d13eafa1381d54
-
Filesize
27KB
MD5764d47b36dc060e15414e850c974b983
SHA14cd0ef1c6a951c50844e441a3673de505aa38004
SHA2563fa89372d50cee57a316e279bb092287fad67ec1f47cc8f75178a985f43b5cd8
SHA5129017d3ddc85a919fd1ad5ae182c2e4f1194eeadea98f185a158b5c424b7730f30f10b18ca902cbbbc83d6567033d79327c7b1efa89d36b55b9066a8785530984
-
Filesize
26KB
MD5c4e594d01bdcefcb1b71f06697e13c89
SHA126a90b0912332fde26451e2efbbed6bd8c4bd02c
SHA256a1be434cb4d92a01fa3b43c1967f254be29dcaa25ceeb6cb13fed711f90b81ff
SHA5121d0a1cfc7c8e10bc6b2cc9dcf6db0e204877439fa4cde26e6b1464cedb35676e67416956ca1b2873a10f0ab00a6049d000097c254ede77b06b1f329c34f17d0c
-
Filesize
253KB
MD549ac3c96d270702a27b4895e4ce1f42a
SHA155b90405f1e1b72143c64113e8bc65608dd3fd76
SHA25682aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f
SHA512b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0
-
Filesize
455KB
MD53284088a2d414d65e865004fdb641936
SHA17f3e9180d9025fc14c8a7868b763b0c3e7a900b4
SHA256102f69b5a98352a6a1a6b26bc2c86ee7611c1f45f5a9ca04f5a8841961f191c6
SHA5126786fb431addf05df256d0e1383501f96356aa78f66482db9772c58334aead59838abb7db0ea793d4a17627a357598266681c28328485489a21bc2985e751b62
-
Filesize
788B
MD54a82dddf04871b6b44389dc007a6594d
SHA1b8369b04b5db309a1e2c12e2b4a0ceac503fd8c6
SHA2562f90dbe6efdee312ac361a7aaa06bf953045961b892af43ab96e9ef9af62b854
SHA512812bee52528aa4f8d500ad93e3361da0f80787dad3cbf478f4acb5388e5b1bbbaf6b675e22dc9b08dfe59d6851ae7c7a96b4ccf11791aa2c96d4b3ec12c02466
-
Filesize
455KB
MD50ce624d3a5a586c2bdda26b748da78d7
SHA1b9ed0a86eae645ba19ed08327888a4474c95e34a
SHA256fd597b58a578cfa46e1818b3b4b795ca6d25225dc11ee86cd491f3d55d7b235d
SHA512e5bc577bd319eb3ac70c527acfb313fac817e63f5184e6581f6d813491ca0f1a0f80583c14c2b9f2b8fa1df5938c2ae3318a91bda41171c63cd1670c55a85b7f
-
C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86_000_vcRuntimeMinimum_x86.txt
Filesize4KB
MD5e37f3a961153aeb044940389f785ead6
SHA1d5515f9004d9b7fe3a68b8a717e1f858fe538c15
SHA2561457ef2caff76c8e88fb185f4eb5c5d794fefdef419b761cce178fe4890165a1
SHA512046a98cb91b5a27d06afcd1e325e789238d62e4e24e7ea8da9c3f827ea67dd1b62c97e24754dc7ddadc502ab170035e3fb5704b628d0a08ef5829e92b52930fc
-
C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86_001_vcRuntimeAdditional_x86.txt
Filesize2KB
MD50fa1256a382ac85933da736fa2ca7925
SHA1e6817abc4aabb97396d8db707f9f7aa93b7d5696
SHA256eb9b3b8a48eacd5112069c09753bbf3423c04eddf9a1e160c790e678f63bb25d
SHA51284eae627b50cae79134949e2817c4f2ee3fa28b7eb3b85a96462ff1beaa1b799ec6eac35eff44cd14c7225897540a2ba9c0982e8a0765c6644d8bdebd9e51d9e
-
C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64_000_vcRuntimeMinimum_x64.txt
Filesize2KB
MD531bfc9f33f79cb4d61a41331855cff77
SHA1d661e76362ac4556c0d64fd368a0b1e6820f8778
SHA2566d6a5aca6e0e1bd1a12d55d59ca838e6f9f7bda3c81430b6a5f2dd62bd56451d
SHA512e69682961d88f37c40e67ac195325505fce234bfe83d4f2009a362d77f8bbb4e1e45582b307bd5f72722a036ee43de6bf3947248cbe33dcb6827e2cccb574889
-
C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64_001_vcRuntimeAdditional_x64.txt
Filesize2KB
MD52265171bbd8d744b037ee6e469056211
SHA1fa39c55174f918edddb08c2ba08e6d933e36995c
SHA25656d389b0699ec6b16f56e17f9b9ec7af314c032f065408dec86891446c2f50ad
SHA512dda909773b665d110693a31576a2672639a87302be0631b0f75c723501bc2c7337e62b987e01677b04dbe1b6644577cc93f3a63110fa7298687b5f88a8b40466
-
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe
Filesize116.7MB
MD59eb3d6612f840bc508c55b715c5bd4ff
SHA140182a36d003d636d33ace168d6b62e29412ac3a
SHA256f7a3fc30ee3bc14fa4bf60c216832da5ddd46852638b117d9937d310c8abe22c
SHA512847c3825187304ee37924a14faea52c7ce423835f5d9fc72d8874e55068b12fbd416ac154ebb376225c10c1c398f5318aca78e44db7ea4c84705fbc905407477
-
C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe
Filesize116.7MB
MD59eb3d6612f840bc508c55b715c5bd4ff
SHA140182a36d003d636d33ace168d6b62e29412ac3a
SHA256f7a3fc30ee3bc14fa4bf60c216832da5ddd46852638b117d9937d310c8abe22c
SHA512847c3825187304ee37924a14faea52c7ce423835f5d9fc72d8874e55068b12fbd416ac154ebb376225c10c1c398f5318aca78e44db7ea4c84705fbc905407477
-
Filesize
6.9MB
MD549b1164f8e95ec6409ea83cdb352d8da
SHA11194e6bf4153fa88f20b2a70ac15bc359ada4ee2
SHA256a4bba7701e355ae29c403431f871a537897c363e215cafe706615e270984f17c
SHA51229b65e45ce5233f5ad480673752529026f59a760466a1026bb92fc78d1ccc82396ecb8f07b0e49c9b2315dbef976cb417273c77f4209475036775fe687dd2d60
-
Filesize
6.9MB
MD549b1164f8e95ec6409ea83cdb352d8da
SHA11194e6bf4153fa88f20b2a70ac15bc359ada4ee2
SHA256a4bba7701e355ae29c403431f871a537897c363e215cafe706615e270984f17c
SHA51229b65e45ce5233f5ad480673752529026f59a760466a1026bb92fc78d1ccc82396ecb8f07b0e49c9b2315dbef976cb417273c77f4209475036775fe687dd2d60
-
Filesize
6.9MB
MD549b1164f8e95ec6409ea83cdb352d8da
SHA11194e6bf4153fa88f20b2a70ac15bc359ada4ee2
SHA256a4bba7701e355ae29c403431f871a537897c363e215cafe706615e270984f17c
SHA51229b65e45ce5233f5ad480673752529026f59a760466a1026bb92fc78d1ccc82396ecb8f07b0e49c9b2315dbef976cb417273c77f4209475036775fe687dd2d60
-
Filesize
6.2MB
MD538a1b890ce847167d16567cf7b7a5642
SHA10f5d66bcaf120f2d3f340e448a268fe4bbf7709d
SHA25653b605d1100ab0a88b867447bbf9274b5938125024ba01f5105a9e178a3dcdbd
SHA512907a9aac75f4f241a85ecb94690f74f5818eea0b2241d9ef6d4bf171f17da0f4bc702e2bb90c04f194592fcc61df5c250508d16b886ed837a74b9f45da9627cd
-
Filesize
6.2MB
MD538a1b890ce847167d16567cf7b7a5642
SHA10f5d66bcaf120f2d3f340e448a268fe4bbf7709d
SHA25653b605d1100ab0a88b867447bbf9274b5938125024ba01f5105a9e178a3dcdbd
SHA512907a9aac75f4f241a85ecb94690f74f5818eea0b2241d9ef6d4bf171f17da0f4bc702e2bb90c04f194592fcc61df5c250508d16b886ed837a74b9f45da9627cd
-
Filesize
6.2MB
MD538a1b890ce847167d16567cf7b7a5642
SHA10f5d66bcaf120f2d3f340e448a268fe4bbf7709d
SHA25653b605d1100ab0a88b867447bbf9274b5938125024ba01f5105a9e178a3dcdbd
SHA512907a9aac75f4f241a85ecb94690f74f5818eea0b2241d9ef6d4bf171f17da0f4bc702e2bb90c04f194592fcc61df5c250508d16b886ed837a74b9f45da9627cd
-
Filesize
1KB
MD59688917becb433ed5126bf54638a998d
SHA1aa9da79feb56a3cb3bc82b912453ae9b6d82d7d9
SHA256a7ce825b2da02e3c12db07fccc3cfd69e50c1349e0f9261e4fdff8011535e546
SHA5122ecb77373161c02defa0b55dd3fa00a04a25476b3b3e76f2a7c58952f0b8de8df47761ba0ea8db1f25ba662659dfddb388fdda9899a27048644bea512f20b9ea
-
Filesize
2.3MB
MD5a61f48cc69f48555ca3f104acecc11f5
SHA1ac20b910c3b979619f893dc0bedde6d92950d0de
SHA2567bfd208c8244463a88acd85e0955fe84230c7a7a2f994d95957f48248e4bdab7
SHA5124712ca1de44e532d594cc31058ef624b33f24735a65f6a4003cd5887e67b4fcc394495f2dad5b40c36a56b1193cacc2595e56a0304451e32fcd9727e16c5c450
-
Filesize
56KB
MD5203db005a51939eb1b46340547d13608
SHA119e47700423833bd3f6b33de4d4d1d74d7e81db0
SHA25622a045f9379755f8c564c57080e3de48ed3b7aef97c66eca4f4fbcb400e8540f
SHA512b1436dc32b632b4166f6201e513b590c8b54b00c7f4c4612c16c38acdd86e4ca08a9ad4a75639016e4bbac6212fbdd711ec02f0bb814eecdb10ce9ac4c0b4d16
-
Filesize
4.6MB
MD5ef9a05b54e5cf2d919dc96ddd8989e9b
SHA1291d6fc45e2228f1d58706a13cd5015d07756d61
SHA25619b354b41d0e454184d0f1571dcaa4406011ca5f81b4bc274ac0de031ac5a573
SHA512e88be68ef1f27c0ef1473ab22c10faa39871cceab38a6b74a50c4fea51ee2c243e9fb1a2d225b71a0ec946035d32bd5dd3114561b3ed238f2cded0ef5dbdc567
-
Filesize
4.6MB
MD5ef9a05b54e5cf2d919dc96ddd8989e9b
SHA1291d6fc45e2228f1d58706a13cd5015d07756d61
SHA25619b354b41d0e454184d0f1571dcaa4406011ca5f81b4bc274ac0de031ac5a573
SHA512e88be68ef1f27c0ef1473ab22c10faa39871cceab38a6b74a50c4fea51ee2c243e9fb1a2d225b71a0ec946035d32bd5dd3114561b3ed238f2cded0ef5dbdc567
-
Filesize
5KB
MD5f854edee386b47b82146c53293f7771f
SHA1299ab3e435639d791e1c1300f109e706f0288973
SHA256cdaeca08f3129d79b7c4b47cb8ddb3558392658268f8203076c27cb855a9ef80
SHA512295f74e95eab550253d011ba36534c7ffc04ff60ca8e58b316d2d02ae4700b99e6687643bf5aa439400eaf20d58ab31e8179c0662c76cf264bcdd4385ca55ba4
-
Filesize
2.8MB
MD58d5930d2e9af0a6ee4370e470e57d40b
SHA10ed407656c5f4fb5e1a4c8c56255e1ff5d7f8b9b
SHA256beede3a492c283de23eda7ca7ed847c8a631a5fc56aa9108468155163ef85b83
SHA5128a3cbb9207ecf082ffe92b0c5dcd9cab8cd48ad8a502afa87bf2bd83e50da16bd6622e8701b13efcaaa1a829fbd94a9fd1849b7bd3ecddd4d994da4b62688701
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e
-
Filesize
455KB
MD53284088a2d414d65e865004fdb641936
SHA17f3e9180d9025fc14c8a7868b763b0c3e7a900b4
SHA256102f69b5a98352a6a1a6b26bc2c86ee7611c1f45f5a9ca04f5a8841961f191c6
SHA5126786fb431addf05df256d0e1383501f96356aa78f66482db9772c58334aead59838abb7db0ea793d4a17627a357598266681c28328485489a21bc2985e751b62
-
C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\cab2C04DDC374BD96EB5C8EB8208F2C7C92
Filesize5.3MB
MD5f5879f5f3ffa839a280ab853338de872
SHA13b4366abb2da245416531925ebd8c76adc3e90ef
SHA2561f2f8f5d60dadbc6e4d3d36c88cc54f22af0a615b609609e748782dc26231174
SHA51296a88601cedf859c9fcd388d9e8d2fd6139f6e69ab6b05b0e044d1a598cd1a066d27a0f7a7c71bd77576dcdd083dec7a55f2cd9de52ff95aac23171c9f9670de
-
C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\cab5046A8AB272BF37297BB7928664C9503
Filesize1010KB
MD5361903c5ff86511786d7b450301dd640
SHA1c9fc04a718a388294658590f1240d8c7e9ee4f82
SHA256e95d29cbb06bb323d9d43fc2ce61d4565b0866622a83d93df76430a0c252b433
SHA51278ceaaaa7f3e1a40ac2528e2f169416d6ebfaba54301754035f2a62f845421c8cddaed84770182e51794c9fb32720aec998d453de2bef621de7a7e2b3b35af20
-
Filesize
140KB
MD54f782799f84cd006f7f1c750afb04d8c
SHA10cd219d326fd40665d2f1b22569e2517792edfd9
SHA2568909e5c1d917064983595a4e4717f758c2a8df8f59d7b31a5b79b2f95bd8f7cc
SHA512cfddad551aa5a35b032b7006b167fd322aff46ec8a2934632c087882b24404ee48083ee38b9110add9846880b1ae0bed136bb21ae751e1d3cde9dc27eaed5915
-
Filesize
140KB
MD587b74c694f295830ffe516ba20de0b93
SHA1e6996d47bb76ad25954b793f73211524490f55a9
SHA256e88d0915814e622cd1deca849efa23a0d58d5d756be44ebbb4d460d3dac9e816
SHA512d0fd7f8c8964a99ce7a9d187640acdbff4ca3d16f02e44696706d6107b58890e763a18857bec2b94f92ca559510fea0ae5515ce3de20aa4371aebb38006c05eb
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e
-
Filesize
455KB
MD50ce624d3a5a586c2bdda26b748da78d7
SHA1b9ed0a86eae645ba19ed08327888a4474c95e34a
SHA256fd597b58a578cfa46e1818b3b4b795ca6d25225dc11ee86cd491f3d55d7b235d
SHA512e5bc577bd319eb3ac70c527acfb313fac817e63f5184e6581f6d813491ca0f1a0f80583c14c2b9f2b8fa1df5938c2ae3318a91bda41171c63cd1670c55a85b7f
-
C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\cab54A5CABBE7274D8A22EB58060AAB7623
Filesize973KB
MD5258b65eb9fed187051d5fcec7ce65dc5
SHA1b9afc5fcd8c6ca2ee3dfe9507e9adabdd9ded039
SHA25680a29d5ce27c6794b9a38e5d5b98d535f877ac3363f450ee7ac0be9394426e49
SHA5128d5b4c14deb07cc1bf70abfd6e04573822eff3b3937fb3867f5300d97c46f900f2446f923334d1cf5b51b17eeef063d6d59e8540456f310edecd98d223125bb1
-
C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\cabB3E1576D1FEFBB979E13B1A5379E0B16
Filesize4.7MB
MD57fe64755ed8427ee4512760b69cfaee1
SHA130b8c69a5eb83a1804975f04fd0e701e2e9d98cc
SHA256e12efc1bc0c61a7b9ba10a07502ef6833297d028368760da26e63218b744da79
SHA512dc6c9dc1cb0502be87281ad5bae3ed54c5cfc7cbc4434880f1ba7a33599fc5503d8192ce6afbcf8ffcc142955f593e9830e49e72c0d5c9a7aac5f91024eac38f
-
Filesize
140KB
MD5b547a22dcdcf3d035a56f52f1b16c2b5
SHA1ec9e2fbee0a5c43c021365a35d1d6d04eea335b3
SHA2567cef0419f52c47f41b9546065e6788f20de07a7f1e647589ab52d88f6c7e50a5
SHA5126d49cd8266575f3a9cac205425f1fc11b70a58b0a657ba3e4ebafab43cc37ccaf54f551cbf367c8c08b2a6710f82a18ccffb3870683a9b922c91cff19ea7b65a
-
Filesize
140KB
MD589d36fccb34b319b60d1850863e0560b
SHA1f356410e3946063b85750f54998582510b9672c8
SHA25660714fcdac0a7cbfc45e6ed9bc6d4b7f8536947f630016e5faca5cce1745adcf
SHA51224e167d0305811409e433c8d78716e9b3af4bce4b3f372276f4730ae7c802b8be8f193a70ac0d44ad6e083a35f03fcfdb2faaae4a9975c9e2ef1254285b0309f
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e