Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
840s -
max time network
869s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/02/2023, 17:43
Static task
static1
General
-
Target
WS.Filmora.11.7.3.814.w64.rar
-
Size
471.9MB
-
MD5
4c80d5d58c201cb78fd5af10000cf85d
-
SHA1
041356b6fee6ebcde2a769c43d3c99afa22f5c6d
-
SHA256
4a386815be0781d9ec8defe96bf6818f196b28a1c484357733b13bd8804f2f85
-
SHA512
3240123d22aeeca127b75804657ef83882738f77ec6beaec4a41a860d2e2b02395ea73857e15b9b225d0a3c922c5b918bdfadd408a89e43884b0f61206dcad27
-
SSDEEP
12582912:MZDK+XshsBiG+0e5yb/ORHC0WO9sjzUV4s7AesKarfAn1eqtlju:EDK+cSiGR5b/wi0W0lV1Mes1Angula
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Wondershare Filmora 11.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FilmoraPlayer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DataReporting.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FilmoraPlayer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MessageService.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Wondershare Filmora 11.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FilmoraPlayer.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts NOTEPAD.EXE -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Locale = "*" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Version = "11,0,15063,0" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\IsInstalled = "1" ie4uinit.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1136 netsh.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DataReporting.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MessageService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Wondershare Filmora 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Wondershare Filmora 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MessageService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Wondershare Filmora 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DataReporting.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Wondershare Filmora 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FilmoraPlayer.exe -
Executes dropped EXE 44 IoCs
pid Process 4772 filmora_64bit_full846.exe 164 filmora_64bit_full846.tmp 1868 _setup64.tmp 4668 Wondershare Helper Compact.exe 3696 Wondershare Helper Compact.tmp 4924 WSHelper.exe 196 vcredist_x64.exe 2936 install.exe 1608 Wondershare NativePush.exe 3508 Wondershare NativePush.tmp 3388 _setup64.tmp 2356 WsNativePushService.exe 2324 WsNativePushService.exe 3172 WsNativePushService.exe 2404 WsToastNotification.exe 2028 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 4128 AlgorithmRunTest.exe 3964 AlgorithmRunTest.exe 4788 FilmoraPlayer.exe 2308 TC_Medicine11.7.3.exe 652 Blue_BorFX_Medicine.exe 1776 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 3372 AlgorithmRunTest.exe 4060 AlgorithmRunTest.exe 3480 FilmoraPlayer.exe 1660 ocl_check.exe 2344 ocl_check.exe 764 ocl_check.exe 1224 DataReporting.exe 360 WSHelper.exe 3456 FilmoraPlayer.exe 2156 perf_check.exe 5112 wmic.exe 2264 Wondershare Filmora Update(x64).exe 1688 coremediaserver.exe 3700 cmdCheckHEVC.exe 3964 Wondershare Filmora Update(x64).tmp 3312 _setup64.tmp 324 ChromeRecovery.exe 4060 MessageService.exe 5528 CefViewWing.exe 3148 CefViewWing.exe -
Loads dropped DLL 64 IoCs
pid Process 164 filmora_64bit_full846.tmp 164 filmora_64bit_full846.tmp 164 filmora_64bit_full846.tmp 164 filmora_64bit_full846.tmp 3696 Wondershare Helper Compact.tmp 3696 Wondershare Helper Compact.tmp 3696 Wondershare Helper Compact.tmp 4924 WSHelper.exe 4924 WSHelper.exe 4924 WSHelper.exe 4924 WSHelper.exe 4924 WSHelper.exe 2936 install.exe 2404 WsToastNotification.exe 2404 WsToastNotification.exe 164 filmora_64bit_full846.tmp 164 filmora_64bit_full846.tmp 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe -
Registers COM server for autorun 1 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\system32\\dxdiagn.dll" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\CLSID\{14100442-9664-1407-2647-000000000000}\LocalServer32 WsToastNotification.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\CLSID\{14100442-9664-1407-2647-000000000000}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Wondershare\\Wondershare NativePush\\WsToastNotification.exe\" -ToastActivated" WsToastNotification.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe -
resource yara_rule behavioral1/memory/2308-958-0x00007FF9C8D40000-0x00007FF9C9641000-memory.dmp themida behavioral1/memory/2308-959-0x00007FF9BB490000-0x00007FF9BC14C000-memory.dmp themida behavioral1/memory/2308-993-0x00007FF9C8D40000-0x00007FF9C9641000-memory.dmp themida behavioral1/memory/2308-998-0x00007FF9BB490000-0x00007FF9BC14C000-memory.dmp themida behavioral1/memory/3480-1013-0x00007FF9C8D40000-0x00007FF9C9641000-memory.dmp themida behavioral1/memory/1224-1174-0x00007FF9C8D40000-0x00007FF9C9641000-memory.dmp themida behavioral1/memory/3456-1264-0x00007FF9C8D40000-0x00007FF9C9641000-memory.dmp themida behavioral1/memory/4060-1362-0x00007FF9C8D40000-0x00007FF9C9641000-memory.dmp themida behavioral1/memory/4060-1365-0x00007FF9C8D40000-0x00007FF9C9641000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Wondershare Helper Compact.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wondershare Helper Compact.exe = "C:\\Program Files (x86)\\Common Files\\Wondershare\\Wondershare Helper Compact\\WSHelper.exe" Wondershare Helper Compact.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wondershare Filmora 11.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DataReporting.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FilmoraPlayer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MessageService.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wondershare Filmora 11.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: FilmoraPlayer.exe File opened (read-only) \??\F: FilmoraPlayer.exe File opened (read-only) \??\L: FilmoraPlayer.exe File opened (read-only) \??\X: FilmoraPlayer.exe File opened (read-only) \??\Z: FilmoraPlayer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: FilmoraPlayer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: FilmoraPlayer.exe File opened (read-only) \??\F: FilmoraPlayer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: FilmoraPlayer.exe File opened (read-only) \??\M: FilmoraPlayer.exe File opened (read-only) \??\W: FilmoraPlayer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: FilmoraPlayer.exe File opened (read-only) \??\M: FilmoraPlayer.exe File opened (read-only) \??\P: FilmoraPlayer.exe File opened (read-only) \??\E: FilmoraPlayer.exe File opened (read-only) \??\Y: FilmoraPlayer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: FilmoraPlayer.exe File opened (read-only) \??\U: FilmoraPlayer.exe File opened (read-only) \??\F: FilmoraPlayer.exe File opened (read-only) \??\Q: FilmoraPlayer.exe File opened (read-only) \??\I: FilmoraPlayer.exe File opened (read-only) \??\S: FilmoraPlayer.exe File opened (read-only) \??\U: FilmoraPlayer.exe File opened (read-only) \??\L: FilmoraPlayer.exe File opened (read-only) \??\R: FilmoraPlayer.exe File opened (read-only) \??\T: FilmoraPlayer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: FilmoraPlayer.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: FilmoraPlayer.exe File opened (read-only) \??\L: FilmoraPlayer.exe File opened (read-only) \??\Y: FilmoraPlayer.exe File opened (read-only) \??\G: FilmoraPlayer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: FilmoraPlayer.exe File opened (read-only) \??\J: FilmoraPlayer.exe File opened (read-only) \??\R: FilmoraPlayer.exe File opened (read-only) \??\T: FilmoraPlayer.exe File opened (read-only) \??\V: FilmoraPlayer.exe File opened (read-only) \??\X: FilmoraPlayer.exe File opened (read-only) \??\S: FilmoraPlayer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: FilmoraPlayer.exe File opened (read-only) \??\N: FilmoraPlayer.exe File opened (read-only) \??\I: FilmoraPlayer.exe File opened (read-only) \??\X: FilmoraPlayer.exe File opened (read-only) \??\Y: FilmoraPlayer.exe File opened (read-only) \??\I: FilmoraPlayer.exe File opened (read-only) \??\P: FilmoraPlayer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: FilmoraPlayer.exe File opened (read-only) \??\K: FilmoraPlayer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 7 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DataReporting.exe File opened for modification \??\PhysicalDrive0 FilmoraPlayer.exe File opened for modification \??\PhysicalDrive0 MessageService.exe File opened for modification \??\PhysicalDrive0 Wondershare Filmora 11.exe File opened for modification \??\PhysicalDrive0 FilmoraPlayer.exe File opened for modification \??\PhysicalDrive0 Wondershare Filmora 11.exe File opened for modification \??\PhysicalDrive0 FilmoraPlayer.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_74965e869fab271a\mshdc.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_e15abe7d25aa2071\input.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_b0ca8be2ac09ed24\msmouse.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\keyboard.inf_amd64_82738beb7b514250\keyboard.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_8e5f608c0111283d\usbport.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\msmouse.inf_amd64_b0ca8be2ac09ed24\msmouse.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\machine.inf_amd64_e6c89cc58804e205\machine.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_e22da3cb2d7a1ed6\hdaudbus.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_e6c89cc58804e205\machine.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_82738beb7b514250\keyboard.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\hdaudbus.inf_amd64_e22da3cb2d7a1ed6\hdaudbus.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\mshdc.inf_amd64_74965e869fab271a\mshdc.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\usbport.inf_amd64_8e5f608c0111283d\usbport.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\input.inf_amd64_e15abe7d25aa2071\input.PNF dxdiag.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 4788 FilmoraPlayer.exe 4788 FilmoraPlayer.exe 4788 FilmoraPlayer.exe 2308 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 3480 FilmoraPlayer.exe 3480 FilmoraPlayer.exe 3480 FilmoraPlayer.exe 3480 FilmoraPlayer.exe 1224 DataReporting.exe 1224 DataReporting.exe 1224 DataReporting.exe 1224 DataReporting.exe 3456 FilmoraPlayer.exe 3456 FilmoraPlayer.exe 3456 FilmoraPlayer.exe 3456 FilmoraPlayer.exe 4060 MessageService.exe 4060 MessageService.exe 4060 MessageService.exe 4060 MessageService.exe -
Drops file in Program Files directory 58 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\is-VNGR0.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files\BorisFX\ContinuumOFX\15 Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\is-P39MN.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\images\is-H9561.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\is-HGPS7.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Wondershare Helper Compact.exe Wondershare Helper Compact.tmp File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\manifest.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\_metadata\verified_contents.json elevation_service.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-8ETVI.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Languages\is-VS1TJ.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\is-GU7JG.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-76KFE.tmp Wondershare Helper Compact.tmp File created C:\Program Files\BorisFX\ContinuumOFX\15\lib\__tmp_rar_sfx_access_check_241159062 Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-HBCCS.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\is-GU8JF.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\images\is-GAG6U.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\is-15493.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-GMP4Q.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-LK14V.tmp Wondershare Helper Compact.tmp File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\ChromeRecovery.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\manifest.json elevation_service.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\is-F35PL.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-1000S.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-RA5FC.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-JI02G.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\is-KFQLG.tmp Wondershare Helper Compact.tmp File created C:\Program Files\BorisFX\ContinuumOFX\15\lib\Continuum_OFX_8Bit.dll Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-B6JOB.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-7U96F.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files\BorisFX\ContinuumOFX Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-BRFCC.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files\BorisFX Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-61RNR.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Wondershare Helper Compact.exe Wondershare Helper Compact.tmp File opened for modification C:\Program Files\BorisFX\ContinuumOFX\15\lib\Continuum_OFX_Float.dll Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-4MK0J.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\images\is-UI51I.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\unins000.dat Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\is-P0655.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files\BorisFX\ContinuumOFX\15\lib\Continuum_OFX_8Bit.dll Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-I1ACH.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\images\is-PH734.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\images\is-L6R5I.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files\BorisFX\ContinuumOFX\15\lib Blue_BorFX_Medicine.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\ChromeRecoveryCRX.crx elevation_service.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\unins000.dat Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-881IF.tmp Wondershare Helper Compact.tmp File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\ChromeRecovery.exe elevation_service.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-0H5P0.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-8DF58.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-GS4E8.tmp Wondershare Helper Compact.tmp File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\_metadata\verified_contents.json elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.ini Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe_temp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\images\is-6M5QA.tmp Wondershare Helper Compact.tmp File created C:\Program Files\BorisFX\ContinuumOFX\15\lib\Continuum_OFX_Float.dll Blue_BorFX_Medicine.exe File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\is-OI5DF.tmp Wondershare Helper Compact.tmp File created C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Pages\suit\style\is-TGS60.tmp Wondershare Helper Compact.tmp -
Drops file in Windows directory 64 IoCs
description ioc Process File created \??\c:\Windows\Installer\e5e3508.msi msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\1007C6B46D7C017319E3B52CF3EC196E\9.0.30729\FL_msdia71_dll_2_60035_amd64_ln.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441586.1\9.0.30729.4148.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441614.1\9.0.30729.4148.policy msiexec.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90enu.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90rus.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441599.1 msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441614.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441552.0\amd64_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_069f922e.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441614.1\9.0.30729.4148.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441552.0\msvcp90.dll msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\1007C6B46D7C017319E3B52CF3EC196E\9.0.30729 msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441552.0 msiexec.exe File created C:\Windows\Installer\SourceHash{4B6C7001-C7D6-3710-913E-5BC23FCE91E6} msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90jpn.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441599.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441599.1\9.0.30729.4148.policy msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90cht.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90deu.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.0\mfc90u.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441568.0 msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441568.1 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441599.0\9.0.30729.4148.policy msiexec.exe File created \??\c:\Windows\Installer\e5e350b.msi msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441586.0 msiexec.exe File opened for modification \??\c:\Windows\Installer\e5e3508.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI39CB.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\amd64_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_480678f3.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90chs.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.0\mfcm90u.dll msiexec.exe File opened for modification C:\Windows\setuperr.log dxdiag.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90fra.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441586.1\9.0.30729.4148.policy msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441552.0\msvcr90.dll msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\1007C6B46D7C017319E3B52CF3EC196E\9.0.30729\FL_msdia71_dll_2_60035_amd64_ln.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441505.0\atl90.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.0\amd64_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_d7860533.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441505.0\amd64_Microsoft.VC90.ATL_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_673f7fa2.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90ita.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90kor.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.0\mfcm90.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441505.0 msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441599.0\9.0.30729.4148.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.0\amd64_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_d7860533.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\amd64_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_480678f3.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441586.0\amd64_Microsoft.VC90.OpenMP_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_22d6ba8a.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441505.0\amd64_Microsoft.VC90.ATL_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_673f7fa2.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441586.0\amd64_Microsoft.VC90.OpenMP_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_22d6ba8a.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441614.0\9.0.30729.4148.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90esp.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441552.0\msvcm90.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441614.0\9.0.30729.4148.policy msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441586.0\vcomp90.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20230203185441614.1 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441599.1\9.0.30729.4148.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441552.0\amd64_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_069f922e.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.0\mfc90.dll msiexec.exe File opened for modification C:\Windows\setupact.log dxdiag.exe File opened for modification \??\c:\Windows\Installer\ msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20230203185441568.1\mfc90esn.dll msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\1007C6B46D7C017319E3B52CF3EC196E msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Wondershare Filmora 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmic.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString coremediaserver.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cmdCheckHEVC.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Wondershare Filmora 11.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Wondershare Filmora 11.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ Wondershare Filmora 11.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Wondershare Filmora 11.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wmic.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 coremediaserver.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmdCheckHEVC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Wondershare Filmora 11.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 5248 TASKKILL.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Capabilities ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities\Hidden = "0" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "12" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION filmora_64bit_full846.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Wondershare Filmora 11.exe = "9999" filmora_64bit_full846.tmp Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListTTL = "0" ie4uinit.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96}\LocalServer32 WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\41A387AA3A7A33D3590FA953D1350011 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E90BA470-0728-47E6-B2E7-0ED0C0CFEA8F}\TypeLib\Version = "1.1" WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5610D1A9-5B54-4E77-9190-94FF9E59AFBA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0FA988D3-BA51-48AD-A518-6462CD5FF547}\ProxyStubClsid32 WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E5E91D68-955D-4DE1-AB8E-89B26DF6A331} WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WFPFile\Shell\Open\Command filmora_64bit_full846.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wfip filmora_64bit_full846.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\ = "Open in S&ame Window" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0FA988D3-BA51-48AD-A518-6462CD5FF547}\ = "IExceptionLog" WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE,-17" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\open\MUIVerb = "@C:\\Windows\\system32\\ieframe.dll,-5732" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0477E5C9-0877-499A-8A7C-154C777293DC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" WSHelper.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\2\0\0\NodeSlot = "30" Wondershare Filmora 11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wfps\ = "WFPSFile" filmora_64bit_full846.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\DefaultIcon ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F0ABE7E0-32E3-472E-924C-162B1996DC23}\TypeLib WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{46884330-13BA-4AC9-BEDC-3A2E955EB8DA}\TypeLib\ = "{D85C6069-D628-4276-93C3-9A94E5338D8B}" WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{55DB3C89-37B9-41E8-87CC-7C578D2F5374}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1007C6B46D7C017319E3B52CF3EC196E\FT_VC_Redist_CRT_x64 = "VC_Redist_12222_amd64_enu" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\1\1\0 = 840031000000000043568e961100444f43554d457e3100006c0009000400efbe0c55a78943568e962e000000a35201000000010000000000000000004200000000001cf60d0044006f00630075006d0065006e0074007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370037003000000018000000 explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\open\CommandId = "IE.File" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WFPBundlesFile\path = "C:\\Users\\Admin\\AppData\\Local\\Wondershare\\Wondershare Filmora" filmora_64bit_full846.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\printto\command ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Features\1007C6B46D7C017319E3B52CF3EC196E msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4D3609D2-1D8A-4E9F-884B-438AFDDECB86}\TypeLib WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{36B0BA4B-20B5-4369-BBCA-9FAADC8EAC19}\ProxyStubClsid32 WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E5E91D68-955D-4DE1-AB8E-89B26DF6A331}\TypeLib\Version = "1.1" WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1007C6B46D7C017319E3B52CF3EC196E\FT_VC_Redist_MFC_x64 = "VC_Redist_12222_amd64_enu" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1007C6B46D7C017319E3B52CF3EC196E\SourceList\PackageName = "vc_red.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WFPBundlesFile\Shell\Open filmora_64bit_full846.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WFPTSFile\Shell\Open\ = "&Open" filmora_64bit_full846.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\iexplore.exe\shell\open ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\AppUserModelId\Wondershare.NotificationApp\DisplayName = "Wondershare" WsToastNotification.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\2\0\0 = 62003100000000004356bd9610005052455345547e3100004a0009000400efbe4356bd964356bd962e000000170603000000020000000000000000000000000000003acc3800500072006500730065007400200056006900640065006f00000018000000 Wondershare Filmora 11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\Shell\Open\ ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70AC1FC1-A22B-4327-9A54-754B9301A056}\TypeLib\Version = "1.1" WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WSCustomerServicePlatform.CustomerService WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E1839CDE-A191-4DA4-9FCE-178A88318DF4} WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E1839CDE-A191-4DA4-9FCE-178A88318DF4}\TypeLib\ = "{D85C6069-D628-4276-93C3-9A94E5338D8B}" WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Wondershare Filmora 11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WFIPFile\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Wondershare\\Wondershare Filmora\\Wondershare Filmora 11.exe\" \"%1\"" filmora_64bit_full846.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\DefaultIcon\ = "%SystemRoot%\\system32\\url.dll,5" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\DefaultIcon ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xht\ = "xhtmlfile" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shellex\ContextMenuHandlers\{a2a9545d-a0c2-42b4-9708-a0b2badd77c8} ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\Open\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{70AC1FC1-A22B-4327-9A54-754B9301A056} WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WFPSFile\Shell filmora_64bit_full846.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wfpts\ = "WFPTSFile" filmora_64bit_full846.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\ = "URL:HyperText Transfer Protocol with Privacy" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Win32Assemblies\Global msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\ = "opennew" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E90BA470-0728-47E6-B2E7-0ED0C0CFEA8F}\TypeLib\ = "{D85C6069-D628-4276-93C3-9A94E5338D8B}" WSHelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5610D1A9-5B54-4E77-9190-94FF9E59AFBA}\TypeLib WSHelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F0ABE7E0-32E3-472E-924C-162B1996DC23}\ = "IPayPerView" WSHelper.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4976 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 9 IoCs
pid Process 376 Wondershare Filmora 11.exe 4788 FilmoraPlayer.exe 2308 Wondershare Filmora 11.exe 3480 FilmoraPlayer.exe 1224 DataReporting.exe 3456 FilmoraPlayer.exe 5304 explorer.exe 5224 vlc.exe 4060 MessageService.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 powershell.exe 2116 powershell.exe 2116 powershell.exe 3696 Wondershare Helper Compact.tmp 3696 Wondershare Helper Compact.tmp 3696 Wondershare Helper Compact.tmp 3696 Wondershare Helper Compact.tmp 3696 Wondershare Helper Compact.tmp 3696 Wondershare Helper Compact.tmp 2932 msiexec.exe 2932 msiexec.exe 3508 Wondershare NativePush.tmp 3508 Wondershare NativePush.tmp 3172 WsNativePushService.exe 3172 WsNativePushService.exe 3172 WsNativePushService.exe 3172 WsNativePushService.exe 1280 chrome.exe 1280 chrome.exe 3596 chrome.exe 3596 chrome.exe 3456 chrome.exe 3456 chrome.exe 432 chrome.exe 432 chrome.exe 868 chrome.exe 868 chrome.exe 1704 chrome.exe 1704 chrome.exe 2028 Wondershare Filmora 11.exe 2028 Wondershare Filmora 11.exe 2260 chrome.exe 2260 chrome.exe 5088 chrome.exe 5088 chrome.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 3596 chrome.exe 3596 chrome.exe 712 chrome.exe 712 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 1776 Wondershare Filmora 11.exe 1776 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 1688 coremediaserver.exe 1688 coremediaserver.exe 1688 coremediaserver.exe 1688 coremediaserver.exe 1688 coremediaserver.exe 1688 coremediaserver.exe 2404 WsToastNotification.exe -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
pid Process 2984 OpenWith.exe 164 filmora_64bit_full846.tmp 376 Wondershare Filmora 11.exe 2308 Wondershare Filmora 11.exe 3456 FilmoraPlayer.exe 5224 vlc.exe 4060 MessageService.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4188 7zG.exe Token: 35 4188 7zG.exe Token: SeSecurityPrivilege 4188 7zG.exe Token: SeSecurityPrivilege 4188 7zG.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeShutdownPrivilege 2936 install.exe Token: SeIncreaseQuotaPrivilege 2936 install.exe Token: SeSecurityPrivilege 2932 msiexec.exe Token: SeCreateTokenPrivilege 2936 install.exe Token: SeAssignPrimaryTokenPrivilege 2936 install.exe Token: SeLockMemoryPrivilege 2936 install.exe Token: SeIncreaseQuotaPrivilege 2936 install.exe Token: SeMachineAccountPrivilege 2936 install.exe Token: SeTcbPrivilege 2936 install.exe Token: SeSecurityPrivilege 2936 install.exe Token: SeTakeOwnershipPrivilege 2936 install.exe Token: SeLoadDriverPrivilege 2936 install.exe Token: SeSystemProfilePrivilege 2936 install.exe Token: SeSystemtimePrivilege 2936 install.exe Token: SeProfSingleProcessPrivilege 2936 install.exe Token: SeIncBasePriorityPrivilege 2936 install.exe Token: SeCreatePagefilePrivilege 2936 install.exe Token: SeCreatePermanentPrivilege 2936 install.exe Token: SeBackupPrivilege 2936 install.exe Token: SeRestorePrivilege 2936 install.exe Token: SeShutdownPrivilege 2936 install.exe Token: SeDebugPrivilege 2936 install.exe Token: SeAuditPrivilege 2936 install.exe Token: SeSystemEnvironmentPrivilege 2936 install.exe Token: SeChangeNotifyPrivilege 2936 install.exe Token: SeRemoteShutdownPrivilege 2936 install.exe Token: SeUndockPrivilege 2936 install.exe Token: SeSyncAgentPrivilege 2936 install.exe Token: SeEnableDelegationPrivilege 2936 install.exe Token: SeManageVolumePrivilege 2936 install.exe Token: SeImpersonatePrivilege 2936 install.exe Token: SeCreateGlobalPrivilege 2936 install.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe Token: SeTakeOwnershipPrivilege 2932 msiexec.exe Token: SeRestorePrivilege 2932 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4188 7zG.exe 4188 7zG.exe 4976 NOTEPAD.EXE 164 filmora_64bit_full846.tmp 4924 WSHelper.exe 3508 Wondershare NativePush.tmp 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 2620 taskmgr.exe 5224 vlc.exe 5224 vlc.exe 5224 vlc.exe 5224 vlc.exe 5224 vlc.exe 5224 vlc.exe 5224 vlc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 2984 OpenWith.exe 4924 WSHelper.exe 376 Wondershare Filmora 11.exe 376 Wondershare Filmora 11.exe 4788 FilmoraPlayer.exe 2308 TC_Medicine11.7.3.exe 2308 TC_Medicine11.7.3.exe 652 Blue_BorFX_Medicine.exe 652 Blue_BorFX_Medicine.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe 4500 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 164 4772 filmora_64bit_full846.exe 82 PID 4772 wrote to memory of 164 4772 filmora_64bit_full846.exe 82 PID 4772 wrote to memory of 164 4772 filmora_64bit_full846.exe 82 PID 164 wrote to memory of 2116 164 filmora_64bit_full846.tmp 83 PID 164 wrote to memory of 2116 164 filmora_64bit_full846.tmp 83 PID 164 wrote to memory of 1868 164 filmora_64bit_full846.tmp 85 PID 164 wrote to memory of 1868 164 filmora_64bit_full846.tmp 85 PID 164 wrote to memory of 5032 164 filmora_64bit_full846.tmp 87 PID 164 wrote to memory of 5032 164 filmora_64bit_full846.tmp 87 PID 164 wrote to memory of 1136 164 filmora_64bit_full846.tmp 88 PID 164 wrote to memory of 1136 164 filmora_64bit_full846.tmp 88 PID 164 wrote to memory of 684 164 filmora_64bit_full846.tmp 89 PID 164 wrote to memory of 684 164 filmora_64bit_full846.tmp 89 PID 164 wrote to memory of 892 164 filmora_64bit_full846.tmp 90 PID 164 wrote to memory of 892 164 filmora_64bit_full846.tmp 90 PID 164 wrote to memory of 4668 164 filmora_64bit_full846.tmp 92 PID 164 wrote to memory of 4668 164 filmora_64bit_full846.tmp 92 PID 164 wrote to memory of 4668 164 filmora_64bit_full846.tmp 92 PID 4668 wrote to memory of 3696 4668 Wondershare Helper Compact.exe 93 PID 4668 wrote to memory of 3696 4668 Wondershare Helper Compact.exe 93 PID 4668 wrote to memory of 3696 4668 Wondershare Helper Compact.exe 93 PID 3696 wrote to memory of 4924 3696 Wondershare Helper Compact.tmp 95 PID 3696 wrote to memory of 4924 3696 Wondershare Helper Compact.tmp 95 PID 3696 wrote to memory of 4924 3696 Wondershare Helper Compact.tmp 95 PID 164 wrote to memory of 196 164 filmora_64bit_full846.tmp 96 PID 164 wrote to memory of 196 164 filmora_64bit_full846.tmp 96 PID 164 wrote to memory of 196 164 filmora_64bit_full846.tmp 96 PID 196 wrote to memory of 2936 196 vcredist_x64.exe 97 PID 196 wrote to memory of 2936 196 vcredist_x64.exe 97 PID 164 wrote to memory of 1608 164 filmora_64bit_full846.tmp 99 PID 164 wrote to memory of 1608 164 filmora_64bit_full846.tmp 99 PID 164 wrote to memory of 1608 164 filmora_64bit_full846.tmp 99 PID 1608 wrote to memory of 3508 1608 Wondershare NativePush.exe 100 PID 1608 wrote to memory of 3508 1608 Wondershare NativePush.exe 100 PID 1608 wrote to memory of 3508 1608 Wondershare NativePush.exe 100 PID 3508 wrote to memory of 3388 3508 Wondershare NativePush.tmp 101 PID 3508 wrote to memory of 3388 3508 Wondershare NativePush.tmp 101 PID 3508 wrote to memory of 1136 3508 Wondershare NativePush.tmp 103 PID 3508 wrote to memory of 1136 3508 Wondershare NativePush.tmp 103 PID 3508 wrote to memory of 2356 3508 Wondershare NativePush.tmp 106 PID 3508 wrote to memory of 2356 3508 Wondershare NativePush.tmp 106 PID 3508 wrote to memory of 2324 3508 Wondershare NativePush.tmp 108 PID 3508 wrote to memory of 2324 3508 Wondershare NativePush.tmp 108 PID 3172 wrote to memory of 2404 3172 WsNativePushService.exe 112 PID 3172 wrote to memory of 2404 3172 WsNativePushService.exe 112 PID 164 wrote to memory of 3596 164 filmora_64bit_full846.tmp 113 PID 164 wrote to memory of 3596 164 filmora_64bit_full846.tmp 113 PID 3596 wrote to memory of 3664 3596 chrome.exe 114 PID 3596 wrote to memory of 3664 3596 chrome.exe 114 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116 PID 3596 wrote to memory of 860 3596 chrome.exe 116
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WS.Filmora.11.7.3.814.w64.rar1⤵PID:2496
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2984
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3624
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\WS.Filmora.11.7.3.814.w64\" -ad -an -ai#7zMap12970:130:7zEvent58341⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4188
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\Readme.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:4976
-
C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\filmora_64bit_full846.exe"C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\filmora_64bit_full846.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\is-JE435.tmp\filmora_64bit_full846.tmp"C:\Users\Admin\AppData\Local\Temp\is-JE435.tmp\filmora_64bit_full846.tmp" /SL5="$20330,464353272,421888,C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\filmora_64bit_full846.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Environment]::GetFolderPath('MyDocuments') | Out-File "C:\Users\Public\Documents\B30281EA-BA02-4586-86F8-C9BE813884C1.txt" -Encoding UTF83⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\is-6T4O1.tmp\_isetup\_setup64.tmphelper 105 0x3943⤵
- Executes dropped EXE
PID:1868
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s atimpenc.dll3⤵PID:5032
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s atixcode.dll3⤵PID:1136
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s CFDecode64.ax3⤵PID:684
-
-
C:\Windows\system32\ie4uinit.exe"C:\Windows\system32\ie4uinit.exe" -show3⤵
- Modifies Installed Components in the registry
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Modifies registry class
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\is-6T4O1.tmp\Wondershare Helper Compact.exe"C:\Users\Admin\AppData\Local\Temp\is-6T4O1.tmp\Wondershare Helper Compact.exe" /VERYSILENT /SP-3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\is-3NQ68.tmp\Wondershare Helper Compact.tmp"C:\Users\Admin\AppData\Local\Temp\is-3NQ68.tmp\Wondershare Helper Compact.tmp" /SL5="$1039E,2101212,54272,C:\Users\Admin\AppData\Local\Temp\is-6T4O1.tmp\Wondershare Helper Compact.exe" /VERYSILENT /SP-4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe"C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-6T4O1.tmp\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\is-6T4O1.tmp\vcredist_x64.exe" /q3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:196 -
\??\c:\60eb8cab421249f901\install.exec:\60eb8cab421249f901\.\install.exe /q4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare NativePush.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare NativePush.exe" /VERYSILENT /BINDINSTALL3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\is-CHCMN.tmp\Wondershare NativePush.tmp"C:\Users\Admin\AppData\Local\Temp\is-CHCMN.tmp\Wondershare NativePush.tmp" /SL5="$503C2,2940891,938496,C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare NativePush.exe" /VERYSILENT /BINDINSTALL4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\is-TM76G.tmp\_isetup\_setup64.tmphelper 105 0x3EC5⤵
- Executes dropped EXE
PID:3388
-
-
C:\Windows\system32\netsh.exe"netsh.exe" advfirewall firewall add rule name="WsToastNotification" dir=in security=authnoencap action=allow program="C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsToastNotification.exe"5⤵
- Modifies Windows Firewall
PID:1136
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsNativePushService.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsNativePushService.exe" install5⤵
- Executes dropped EXE
PID:2356
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsNativePushService.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsNativePushService.exe" start5⤵
- Executes dropped EXE
PID:2324
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://cbs.wondershare.com/go.php?pid=846&m=i&product_version=11.7.3.814&client_sign={32F18BD3-1ECE-4020-8949-0B6EB7162604}&is_silent_install=03⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ff9cf0d4f50,0x7ff9cf0d4f60,0x7ff9cf0d4f704⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1680 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1508 /prefetch:24⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 /prefetch:84⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:14⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:14⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:14⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4128 /prefetch:84⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:14⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:14⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:14⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5796 /prefetch:84⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5820 /prefetch:84⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5884 /prefetch:84⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5856 /prefetch:84⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:14⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4388 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5568 /prefetch:84⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=800 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4544 /prefetch:84⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:84⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=804 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:84⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5532 /prefetch:84⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4564 /prefetch:84⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5916 /prefetch:84⤵PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=888 /prefetch:84⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:84⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,17651307475028399291,7459500885824843109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:84⤵PID:5328
-
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\Wondershare Filmora 11.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\Wondershare Filmora 11.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora 11.exe4⤵PID:3712
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsNativePushService.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsNativePushService.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsToastNotification.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare NativePush\WsToastNotification.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1896
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora 11.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora 11.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Windows\System32\Wbem\wmic.exewmic diskdrive where index=1 get serialnumber3⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814\resources" 03⤵
- Executes dropped EXE
PID:4128
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814\resources" 13⤵
- Executes dropped EXE
PID:3964
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\FilmoraPlayer.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\FilmoraPlayer.exe" check3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4788
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2620
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3dc1⤵PID:1700
-
C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\TC_Medicine11.7.3.exe"C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\TC_Medicine11.7.3.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308
-
C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\Blue_BorFX_Medicine.exe"C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\Blue_BorFX_Medicine.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:652
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\System32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
PID:4256
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\Wondershare Filmora 11.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\Wondershare Filmora 11.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora 11.exe2⤵PID:4200
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2984
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora 11.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora 11.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2308 -
C:\Windows\System32\Wbem\wmic.exewmic diskdrive where index=1 get serialnumber3⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814\resources" 03⤵
- Executes dropped EXE
PID:3372
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\AlgorithmRunTest.exe" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814" "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814\resources" 13⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\FilmoraPlayer.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\FilmoraPlayer.exe" check3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:3480
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\ocl_check.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\ocl_check.exe" --blacklist "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\opencl_black_list.xml" --whitelist "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\opencl_white_list.xml" --gpu 0 --result "C:/Users/Admin/Documents\Wondershare/Wondershare Filmora\GPUConfig"\ --recheck 03⤵
- Executes dropped EXE
PID:1660
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\ocl_check.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\ocl_check.exe" --blacklist "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\opencl_black_list.xml" --whitelist "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\opencl_white_list.xml" --gpu 1 --result "C:/Users/Admin/Documents\Wondershare/Wondershare Filmora\GPUConfig"\ --recheck 03⤵
- Executes dropped EXE
PID:2344
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\ocl_check.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\ocl_check.exe" --blacklist "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\opencl_black_list.xml" --whitelist "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\opencl_white_list.xml" --gpu 2 --result "C:/Users/Admin/Documents\Wondershare/Wondershare Filmora\GPUConfig"\ --recheck 03⤵
- Executes dropped EXE
PID:764
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\DataReporting.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\DataReporting.exe" WondershareFilmora3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:1224
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive where index=1 get serialnumber3⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\FilmoraPlayer.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\FilmoraPlayer.exe" ""3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:3456
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\perf_check.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\perf_check.exe" --hwinfo "C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora/11.7.3.814/hwinfo.json"3⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dxdiag.exe /dontskip /whql:off /x C:\Users\Admin\AppData\Local\Temp\_000000D7DEEFFA18_.xml4⤵PID:1336
-
C:\Windows\system32\dxdiag.exedxdiag.exe /dontskip /whql:off /x C:\Users\Admin\AppData\Local\Temp\_000000D7DEEFFA18_.xml5⤵
- Registers COM server for autorun
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
PID:516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f /s /q C:\Users\Admin\AppData\Local\Temp\_000000D7DEEFFA18_.xml4⤵PID:5520
-
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\cmdCheckATI.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\cmdCheckATI.exe"3⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora Update(x64).exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\\Wondershare Filmora Update(x64).exe" /VERYSILENT /SP- "/DIR=C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora Update/"3⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\is-7LCVT.tmp\Wondershare Filmora Update(x64).tmp"C:\Users\Admin\AppData\Local\Temp\is-7LCVT.tmp\Wondershare Filmora Update(x64).tmp" /SL5="$4040A,8177289,163840,C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Wondershare Filmora Update(x64).exe" /VERYSILENT /SP- "/DIR=C:/Users/Admin/AppData/Local/Wondershare/Wondershare Filmora Update/"4⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\is-294L7.tmp\_isetup\_setup64.tmphelper 105 0x3EC5⤵
- Executes dropped EXE
PID:3312
-
-
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\coremediaserver.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\coremediaserver.exe" bd1a36123630429c-aa9b13b43c190a6b 23542 2308 "C:\Users\Admin\AppData\Local\Temp\Wondershare Filmora\MediaInfo\Wondershare Filmora 11.exe.sqldb" "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\proxypath" "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\" "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\" "C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\Log"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\cmdCheckHEVC.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\cmdCheckHEVC.exe" 875967049 320 240 1000 30003⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3700
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive where index=1 get serialnumber3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5112
-
-
C:\Windows\explorer.exeexplorer /select, "C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Output\My Video.mp4"3⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\MessageService.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\MessageService.exe" CMD_NATIVEENGINE_METHORD_CLICK_CADDY -1 "" "{ \"accessToken\": \"\", \"autoLoginToken\": \"\", \"deviveUsedCount\": \"-1\", \"email\": \"\", \"expiresTime\": \"1675450811\", \"firstName\": \"\", \"lastName\": \"\", \"licenseType\": \"0\", \"loginState\": \"0\", \"maxDeviveCount\": \"-1\", \"nAvatar\": \"\", \"nickName\": \"\", \"refreshToken\": \"\", \"uid\": \"\" } "3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:4060 -
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\CefViewWing.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\CefViewWing.exe" --type=gpu-process --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\locales" --log-file="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\debug.log" --log-severity=verbose --resources-dir-path="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814" --user-agent="CEF3.3538.1852.win64/QCefView 1.0 (Windows; en-us) wondershare_filmora_win" --lang=en-US --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --locales-dir-path="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\locales" --log-file="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\debug.log" --log-severity=verbose --resources-dir-path="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814" --user-agent="CEF3.3538.1852.win64/QCefView 1.0 (Windows; en-us) wondershare_filmora_win" --lang=en-US --service-request-channel-token=17789937545681945604 --mojo-platform-channel-handle=1740 /prefetch:24⤵
- Executes dropped EXE
PID:5528
-
-
C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\CefViewWing.exe"C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\CefViewWing.exe" --type=renderer --no-sandbox --force-device-scale-factor=1 --service-pipe-token=14698208365706329142 --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\locales" --log-file="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814\debug.log" --log-severity=verbose --resources-dir-path="C:\Users\Admin\AppData\Local\Wondershare\Wondershare Filmora\11.7.3.814" --user-agent="CEF3.3538.1852.win64/QCefView 1.0 (Windows; en-us) wondershare_filmora_win" --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=14698208365706329142 --renderer-client-id=3 --mojo-platform-channel-handle=2584 /prefetch:14⤵
- Executes dropped EXE
PID:3148
-
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL.exe /F /IM MessageService.exe4⤵
- Kills process with taskkill
PID:5248
-
-
-
-
C:\PROGRA~2\COMMON~1\WONDER~1\WONDER~1\WSHelper.exeC:\PROGRA~2\COMMON~1\WONDER~1\WONDER~1\WSHelper.exe -Embedding1⤵
- Executes dropped EXE
PID:360
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
PID:5304 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Output\My Video-highlight.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:5224
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
PID:5308 -
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5308_129792926\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={396ef623-96ac-41ef-a116-4c91872250e0} --system2⤵
- Executes dropped EXE
PID:324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD54ff75f505fddcc6a9ae62216446205d9
SHA1efe32d504ce72f32e92dcf01aa2752b04d81a342
SHA256a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
SHA512ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824
-
Filesize
6KB
MD54ff75f505fddcc6a9ae62216446205d9
SHA1efe32d504ce72f32e92dcf01aa2752b04d81a342
SHA256a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
SHA512ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824
-
Filesize
1.4MB
MD52af0d4e9978fbb968cf508e1c74d7aa4
SHA1d30c337db80324e82fb9728cd243f8d1617e8fe0
SHA25648c138ce7c8d80bfaa079c8a387dbd844aebbc0b4be15e3f0ff2bd5dacee85de
SHA51289d35efdbad77558efd17175621a710470497dbfc124e853e14883ce625b1f8fd7b6cb4d98bc2ee13be875056fc9bd3f76343829db4c53b7ab5dab49dd919861
-
Filesize
1.4MB
MD52af0d4e9978fbb968cf508e1c74d7aa4
SHA1d30c337db80324e82fb9728cd243f8d1617e8fe0
SHA25648c138ce7c8d80bfaa079c8a387dbd844aebbc0b4be15e3f0ff2bd5dacee85de
SHA51289d35efdbad77558efd17175621a710470497dbfc124e853e14883ce625b1f8fd7b6cb4d98bc2ee13be875056fc9bd3f76343829db4c53b7ab5dab49dd919861
-
C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\Readme.txt
Filesize1KB
MD5c9b73ad4887cb9ab23499df67a3be49b
SHA18d13d5eb6f48d94ec2fd2385b7cc03715e6d85e4
SHA2568c1ed89cbffc73ece59ab347cc7c8efad1aa33338fbadccfe25d8900aabb6484
SHA512384923ee1674950a1d32d998d984fe4d5600d2ae9f8efe4b9522430e70426f27be48f74c864424c5013c52e3bdb23d4f576517af6531ce34814ec6aa0390781e
-
C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\filmora_64bit_full846.exe
Filesize444.6MB
MD5d0c1fd8374b9241906c3201f91eb7b35
SHA153ab7408b83d5163b70c4e792009a7a3b16b5cf1
SHA2568d0ce60fb79cf6d404332ab17ba16ee54dd0c5c046c8e6b09424eea23223b534
SHA5128a33d642e2edd3cf562f17429d0ba630e7368e1a2b294bde3a1f9529ecf45b980a5f8455187cfadcc0b3c2647316d18a58c9de1dc7eba422a675cb2e38953fba
-
C:\Users\Admin\Desktop\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\WS.Filmora.11.7.3.814.w64\filmora_64bit_full846.exe
Filesize444.6MB
MD5d0c1fd8374b9241906c3201f91eb7b35
SHA153ab7408b83d5163b70c4e792009a7a3b16b5cf1
SHA2568d0ce60fb79cf6d404332ab17ba16ee54dd0c5c046c8e6b09424eea23223b534
SHA5128a33d642e2edd3cf562f17429d0ba630e7368e1a2b294bde3a1f9529ecf45b980a5f8455187cfadcc0b3c2647316d18a58c9de1dc7eba422a675cb2e38953fba
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\audio\6_Manos_Mars_-_The_Tunning\Data\Manos Mars - The Tunning.mp3
Filesize5.1MB
MD5230d1dcaf630727b6959ed3c7e052162
SHA1a2e94a13b600563d7c8f67401d2b99c6bda1601f
SHA25669b9e0e222a073c72a84b139a21ee039af5deb9870175421dd56c4430af0c4a7
SHA512b1d8efb77aea1f0779a09c85be1dc9f23397caa24d474c97fce46b2ff1aaeaad9024079586eda358ee5977308734b2841d046e9c7cd779fe5941304e504bb038
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\audio\6_Manos_Mars_-_The_Tunning\Manos Mars - The Tunning.jpg
Filesize43KB
MD518a745db233bd85792f1a19a5036ee46
SHA1e0be9174c3905e54e42fc2a2e253add05e144e5d
SHA2565c36703eeb195224fd1185b5cc1b1bec94694624c3793bfc8624a6a6a89f9f13
SHA512d2a69c7235caf43204d9b146a2a6312e0228ff75fcf091ddd71df5e9a9cdb5b9829ec9b47572b070d93081abf11121589710c010ca6228b2b3410050db9b753b
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\audio\6_Manos_Mars_-_The_Tunning\resinfo.json
Filesize1017B
MD5a071b748e0d54b1f85868b4447ffbb8d
SHA146e3433968fe27ff4e179842f15a1424d45f938f
SHA256a7ca782def0a8456271735093bf770974ee6dbe6c50ae0a9c45d44d5cd2216ca
SHA51235d85a42057b5b287c5b017c63c077ecc8901035c7afc1732c5be3b10bbd21516b491d5e90f7125535bdaad071fc80598652db9a11563c89af6ef8e0e324fa96
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\audio\6_Manos_Mars_-_The_Tunning\thumbnail.png
Filesize43KB
MD518a745db233bd85792f1a19a5036ee46
SHA1e0be9174c3905e54e42fc2a2e253add05e144e5d
SHA2565c36703eeb195224fd1185b5cc1b1bec94694624c3793bfc8624a6a6a89f9f13
SHA512d2a69c7235caf43204d9b146a2a6312e0228ff75fcf091ddd71df5e9a9cdb5b9829ec9b47572b070d93081abf11121589710c010ca6228b2b3410050db9b753b
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Blur\Data\Blur.conf
Filesize580B
MD52cba176f7e6da606d24280bcb4f21800
SHA122682801b63821d984bcef0ddbc8041c1106008e
SHA25654f56b411a846c05988fb205893dd2b9a7c9611ef4996f5d0a85c3acc3b97b41
SHA5122807feec2188de0508cfe48c542993f4f321b8500c1a7156a2ecc2533ad2194188665f9b257206f608b04611ed9185107f3e22ad2d7514a86a51c6d692daba7b
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Blur\Data\data.xml
Filesize890B
MD57fc70db5c481bed7f8d31bbc706ed680
SHA1802a368654e54aaf866a20596afec96115d89475
SHA256fe4d6be90fcfc68d9938a8600eead89cc9d4718959804cdf31cc9ad3e6e66352
SHA512f75280c5bd5710b47fa8b8968538c694d2729b3b2aaa85de31bcd3c556a27ec4c5e3b0944b87c71ddd773f8b23bb4bd52a2ec411dedd0aaa64ef08447e429e90
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Blur\Data\filter.xml
Filesize247B
MD505d76d67a79e794a44e2112e200fcff0
SHA1d2337f191ab40dbd8d0d833e2e77d5555b2f5950
SHA2562a8f8c8f2ef31c33bb27b709ad8e7d27eb5d197bb291b99ea43852399d2c93e3
SHA512587887fb407a4e3b2b5cd1fc4745ea0f530f5997a200097dabf5dd876dd17d132e570b10f4941a8279c652a385810d86c096021c2ee09249f5ad269c88314431
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Blur\Giddiness.jpg
Filesize13KB
MD50a07da55f97eb90c485b20362c092eb5
SHA18689ce0f4374f4263754b2f59fe5b21f2b47fb43
SHA25638eb2e95a3647178e69a2f3fd0d267fadee1048902a6896db66128476e6b9cb9
SHA512faa7618078a198ef8b81de545952383a4ae6bebe21304b3b768accea3f0249586ae2b18626bb07bdfa21413f19f06d9e85d46536e4ac3bd0ddef7125ea04c83d
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Blur\resinfo.json
Filesize806B
MD544d8b16d87a46b429c2fdd8862c2d33e
SHA1b5f73423ec32ed9d88d975d5a1a720bfb41da483
SHA256fbfdf49a2c3d23d6a607b4fc067c6a655e97a2ab77ec4140352e1d459749a44b
SHA512a7e02ba36626602088d79bf45fc51ff407feb418f9a6cbbcff57d283ba6f8df591b187a9846f2698bf8506b5aab663b9e3c9d380b30bd2b3e8b04d52150f924c
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Blur\thumbnail.png
Filesize13KB
MD50a07da55f97eb90c485b20362c092eb5
SHA18689ce0f4374f4263754b2f59fe5b21f2b47fb43
SHA25638eb2e95a3647178e69a2f3fd0d267fadee1048902a6896db66128476e6b9cb9
SHA512faa7618078a198ef8b81de545952383a4ae6bebe21304b3b768accea3f0249586ae2b18626bb07bdfa21413f19f06d9e85d46536e4ac3bd0ddef7125ea04c83d
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\Data\Canvas.cl
Filesize2KB
MD5b96393ff4273330ba4934148f3c6cf33
SHA1d29b4bf12cabfffd4bb40542626ee0031972ba1d
SHA2563fd5b0ca591f07f0db067e92b520bc8025c99e0f14d743648cdfbab90fd11c0d
SHA5129fc90d011df78911a72801221225df84d85295a9b4b24706df681553f6acfb42716ddf1bd5cb2e74b8331f5461030a54f4ed901a95aa1f1109bc553a0f4ea3ce
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\Data\Canvas.conf
Filesize312B
MD53709157c6cc272fe7c75d6119f59bbbc
SHA1d5fd54977cf30fcaa0810a56a7dcda964d35558e
SHA25694567b68e6a97bc104afb8429e72d3e963688bb70375f927cfd6b2fb833c6095
SHA5125df95e4e0e23b0159981d071263d5bd3891aaf47464a9aeea89a10bcf898ba36edfda27a551e57775e26c31ec55e4af4a765c2e4a07353338de9d029bef11d2e
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\Data\Canvas.frag
Filesize1KB
MD544cbb017a22c59291327187083eb953e
SHA1a7fc71b9b0e0b3abbef18f2b129076a612b2aff1
SHA2562c84ec5d86cdb681e62f3ed5478a2afb2c32d793e7448ef2c31770c248ba34c9
SHA5125b119f3c2afac4258a03b6e3f524cb93c1862577c56d7deaec6792a9b71bd6df8955621715547e6d77a977e98442f6b111502f85ddc059dfd3623c0960faf575
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\Data\data.xml
Filesize881B
MD5c787222397eb2d14a6071eee02bbd0a3
SHA1ec1ec8bb0acb1748530c7934bb23cfc0f9400628
SHA25689e1f9f1760f65a3ced17a88d54f7193de94272d503c1964687ad27c0f0a3fcb
SHA51231bdfd64b594b52c120a1407811d7d635a10d75f0ae53bf4bd32caac57c3e99575f3b8405bd4da416d8339ee35aec934e4b3f4d3e2f562f7736c02e10bcc7103
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\Data\filter.xml
Filesize251B
MD552d1f7b3af9de519f666e932df3f08ad
SHA1db769adfb974e8807de745e04180948c6a44ee87
SHA256ac8e595eab14933d54dac071a67e27ce7791ae0af1db4d64361a330fe841e5e3
SHA512afd16c623df65c974645c2c6bd20244665a1c9b93221028ffb1083e92859397b573d3d96ebdd2800254e337aa70061ebfd67805bca143d370ad9d27c0c1af37d
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\Data\sketch.png
Filesize406KB
MD56a12135e615e8bc6a709a1c75b14915a
SHA128afaa531d56f0687a6aec34c7d63ba779e1630d
SHA25607d7a66090ccfceaa73ee3eee3d45235ed0610d503f85333d1a88ca8e38ffdf1
SHA512e7b558d545038ee8bac621cd90352d2ce4f2608317715e6597c0c8817321c384e8b525dc81ba9e593d3afd18b7fdf5f880f1974a0ca3f85022d2a32dc187d5ab
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\detail.json
Filesize1KB
MD5d6829b8d6ae1096c49b9671efd42a066
SHA15d629e7ce81f1176fffb0a51992f96920bc701ee
SHA2565e75b0ba1b6d79d48b0bceaf9504f4f166f14c2ffda0beaa18a31e332c484ab1
SHA512cb12875b2bbb70cf9e43f1374c9f2228789aad29901584ba1c5a09bf41db493075510412d57bb952563d416a090f94d6f44b773749f472ae0c6719b7b6f1bb5a
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\resinfo.json
Filesize851B
MD59860cbd54f5e5ba3786029297a13130c
SHA1030258fe0328c002d5c0927b4e0e793c02f533e4
SHA2565a10cc775c2cd405c4b91ff6b175e3d09e8ff16873be7e5691fd911e12a84189
SHA512fe1949b3672017154e2f2cd097d10d4646af6a6b257033b7bee38742f44092c9b1c6319eda9dc998aa85b3b6dabb5d30001e1d242719820d48a95fb1f24814d6
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Canvas\thumbnail.png
Filesize13KB
MD5861750c7bce751a1facce5f95496e4ad
SHA191ad4f3bc6b2c34104288741d7c3d38ba60c0c8b
SHA256fcdf318c236ccbbc316de791d42cb45f7513b81ea3d4d67543d23a4f53714cf8
SHA5125ad43efbd0e1f528b1a609c477582148de3a77299bbef5c950e96e1db8a6d03a8c4d44c484661bb76c300b14cc2067d88d85746591dc86cc14ba75dc73056add
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\Data\Chromatic Aberration.cl
Filesize1KB
MD5efdc96441b214f968c76692ce5cdc4cf
SHA11b4950edcb73e038c6636bfe744c6b12cb8d15cd
SHA256dee4d16cfa62da12f591996626f7a2290b0116c51a5bc188b957d384453b440c
SHA512bbf5b6249160e59ce9f196cf212e15df835da63f59f10e27121d5cd5dc987d7b0a9bceffc19b13c4167de7eba23461b95c9a45da31ebf8b6547d969f213fb8fe
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\Data\Chromatic Aberration.conf
Filesize373B
MD5fa4fd0cb17fcd44d173a637dfbe86a39
SHA1afa7151bcc93bc16f4c11b9933f992b28811dd78
SHA25613ead3bc5bd9bf867e6a8a887faaf71a000c2ddfe224478485fbc1bf24b59539
SHA51274af52cad8c563dd35826f0ec35b4f3ffd02d105eb4e1f340a97541c62f70bd23008abf2edf96245c895ac44a36088005d44788ee390bb35e8820b9c6e582292
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\Data\Chromatic Aberration.frag
Filesize813B
MD53cd820caec58eac715848422f37a3d68
SHA15d63ef1f7a284c028c54321e0d37aa6e670f661b
SHA256b0946f203d53cb0cc7cf69971d287f753a2573e7458aabc7b235abdb69a4a019
SHA5129de2f48aca685c045a394c0abb26b2a851b86eb9269cb8573fc0478dccaacf87478e349fe8a54adeb9558c18db4eda75420905d4a7028ef3d641cc25e4deb3db
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\Data\data.xml
Filesize881B
MD5c787222397eb2d14a6071eee02bbd0a3
SHA1ec1ec8bb0acb1748530c7934bb23cfc0f9400628
SHA25689e1f9f1760f65a3ced17a88d54f7193de94272d503c1964687ad27c0f0a3fcb
SHA51231bdfd64b594b52c120a1407811d7d635a10d75f0ae53bf4bd32caac57c3e99575f3b8405bd4da416d8339ee35aec934e4b3f4d3e2f562f7736c02e10bcc7103
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\Data\filter.xml
Filesize284B
MD56e617237af4130ccea2db527c1ed9d68
SHA19f6fec29b675d43f46d77026191de7d6a234e28f
SHA256b747530e7368e030a10ffd1881b97eff9016024db8e3b6c8cc30882437c083b2
SHA5123512250d6303673a65ccfe0d90d99fa9392dee765d9a1e85ef4d82b0795a824a21bb424ed6e08bbbc6c61e92c8b767ad179f2ee8b9bf6f00341cc972295b7572
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\detail.json
Filesize1KB
MD587bcd107365aafe24d87a87804d70a40
SHA125c2e87c40f8076cfadef98f29a42986b8b97e21
SHA256af2067abff4961face1c668b8a3c659400b9b205e38486ecf72dc2d2e09063ce
SHA5123fe1b2324dfd8965a36c6128bb281773ae95340a434604477caf45b8bf82d18466308e6cd9cf403543f28506807a99ffd336861104afd37817bac1c72d78f3f6
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\resinfo.json
Filesize1004B
MD5ace93952cbc6fce4afdddd9b4aa7d79c
SHA12b9b1759f599543d592808a04174b05a28e3d73a
SHA256cd34c4b1b9c06f606a6868fdc44876b85a3c1969e0a95aef9d17aef7ea649f2a
SHA512e1d4f56ccc521928171e023cd6730a903d28e1c1ae236ac2cde46053cd018c36c480815843a876a9e8f9ad532a2e1015a27925b58788b1682cbb7e7946af9c9b
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Chromatic_Aberration\thumbnail.png
Filesize17KB
MD5e3d183803380efa74659828b75686d3f
SHA1a838d896a9a571bfc9b11d19eb0474f369f4f769
SHA256260e5a2eeb77859882e9bc93c4c20e65dc34feca055597c4d45d4bd56a94070e
SHA512747639bd6cffe2d5199f45f1630a5605d1d9821733dfd6ed2bba0e7764f4d1443724d68b5c426149c1c31361481064ba5343bf7d473c8b9042b19e70ea3eaa22
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Cool_Film\Data\Cool Film.CUBE
Filesize896KB
MD5d012b05a24f80a19d278636e97fee454
SHA19faa9a1695c1b69578c1c7ebdce8745276763f73
SHA256da828049365592b2c45b048094e989f9b9b14990633259e7ab6aa648dc12131e
SHA51200d0bcb917039a7d5e39dd21fc9b851c58b2dd367721b7ea996cd5839a2117f3a7e6b4b2d0c0043a0dd49e34dac98d6c153634967dfc4abaede7625f88da3150
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Cool_Film\Data\data.xml
Filesize881B
MD5c787222397eb2d14a6071eee02bbd0a3
SHA1ec1ec8bb0acb1748530c7934bb23cfc0f9400628
SHA25689e1f9f1760f65a3ced17a88d54f7193de94272d503c1964687ad27c0f0a3fcb
SHA51231bdfd64b594b52c120a1407811d7d635a10d75f0ae53bf4bd32caac57c3e99575f3b8405bd4da416d8339ee35aec934e4b3f4d3e2f562f7736c02e10bcc7103
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Cool_Film\Data\filter.xml
Filesize240B
MD5564c47e034810b2905d3c68a9ed36af9
SHA1ca5ce4cc54ebcc24f19cd59e7d3c85d48c9faf0d
SHA25669a0ebb6d127be5de9a8f745d0b72bd79395e83a0e2ecf57270a61cf53dab998
SHA51208c545f1b022eda5f50c677a7cbdc98b02c658ecae8aa2f15cc455de86eeafe9e126976987c838a0287b1dc65ee44ce22a54455a5710f823049380f4f9b8a09f
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Cool_Film\detail.json
Filesize1KB
MD523f30bb8847f37cb2332244b07222ec7
SHA1d8f0b4b2d23ab8f49d12380a1ecbee59ede05205
SHA2564fc7b3a16758e14473beb6f2a00d17babd45d473f05e922784314ea6eec4d6c6
SHA5129d2aeb22afd7bb15195f36b64d8ac1e7909b827ad534bf834c21e2bb12cfb081c6e96bd6beb932e18d3f9261efd96a51d6e11fe2f60a68d583619f53442d5fed
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Cool_Film\resinfo.json
Filesize925B
MD5ca4257fe37e7f38fcf265c2f099cb496
SHA18df5f77fc8fea1e94f76a29c3ca2639575ba0c0b
SHA25603f4fb5db998dd397e6505e59b858b085a874ec9babdd61a44e76017809ee1b5
SHA5127be17d942f1075ffa3f780b2d256eef4684dbdf6823158b04605e9b3d8191475914b1e9c08acda7fb676e9c0b17ea77bfc5fba80ec96fa7531b85ffe64d232ff
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Cool_Film\thumbnail.png
Filesize14KB
MD5fcdc0a162c89241e1862ecb50a2f8b59
SHA13c28fa259010d10f09d8583895320e79eb52fcde
SHA256abca20fa9763524b84d62f065b49fb170a8dd5d34cd25d049a6d34ef3956cee4
SHA5126b957189a0c7a247a064ba28e8d8c3c79de6acf9fc7f6b35ea7185c2ca9fd183f01949a468a3e72136e85bc64ba65a21f05ca4dc93f2c10353ec06af5bd114ca
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Four_Seasons\Data\FourSeason.conf
Filesize233B
MD5079b01f20da6542f247e120f153e0e4d
SHA15ca043e39701d8bef7204360a4169b8a0d0cf356
SHA25637b297099235ebd38377b0cd2df8479ba9a35c7931fdda5f216565d3f65e424a
SHA5129a0083f6d348c54d606c70e16605b02939d7f716962c395ef1097e5316e273be97ac229f296e52e2c6491a4e2eafe7353e249ee7db0d44a98cae528ee76c1cf0
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Four_Seasons\Data\data.xml
Filesize881B
MD5c787222397eb2d14a6071eee02bbd0a3
SHA1ec1ec8bb0acb1748530c7934bb23cfc0f9400628
SHA25689e1f9f1760f65a3ced17a88d54f7193de94272d503c1964687ad27c0f0a3fcb
SHA51231bdfd64b594b52c120a1407811d7d635a10d75f0ae53bf4bd32caac57c3e99575f3b8405bd4da416d8339ee35aec934e4b3f4d3e2f562f7736c02e10bcc7103
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Four_Seasons\Data\filter.xml
Filesize304B
MD56ac43c627cc68ebb418bc474d0471c1c
SHA1192afb065dd08e1ca86c3ad0d601b7e29fa7642b
SHA256671af274f4c1fdb2f2a7bc13f062b6035e7afb85ee2695885fac9699698f9ee9
SHA512e2de5f24cd94f36db3ac01ad441e0270cfd8aae0144ca1b2a8f54271da9f1f4dbe9d2bcd2889dd6cbd636ca83f74f38303d849b666e090cfdf345f818001cf8a
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Four_Seasons\Data\filter9.cl
Filesize4KB
MD54c36077497e9a322951a553a8f80e56a
SHA172308486db335145cc74539d88838aa69a602929
SHA2568bfbb01c879b306a00f9bebd89d574a8f4aee9064889460dd62051472914c3b9
SHA5128daf800739a4d6d895faa45974f8061efc94f9e52d71b6fc4b8bac4a13995f4f9d55d08c29d2ae7045b66ed81a16e83b607c18414dd16480de4cbf76df4094b1
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Four_Seasons\detail.json
Filesize1KB
MD5ba4447512a9009c71001bff140540ccd
SHA1f1c1d4c9a27da0d362b2bb01d078084a24a9c542
SHA256d916250fc6e6fb6e6c62395271cea6a84f64a73ee75b00f13829e62e49470033
SHA5120f7062d5d4604544e843a63d050106279b2703d9e86f592636ba1e2b765710f1b5c22215f28a4bc952ed4170307a59df0f8111f387e15c1d33ea8d61678427ca
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Four_Seasons\resinfo.json
Filesize1KB
MD5dbc3c41dc00522b086aa84f9fbabd21a
SHA10a3fa161d32f3609546106fba40d269010f49463
SHA25667311e4d6ec893926fed5a57c07fe918a13afa367110b3f5402d416d7583c857
SHA512325c7a4e7752cb787c31e0aff2ed2e55a76520fe27a65bc9a97bcb123da9bdc83da5ccf818df9c8ee97f80257de66b242de6ef642e2d35533ac62a2cd54bde70
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Four_Seasons\thumbnail.png
Filesize14KB
MD51c5950db5a26bf12dbd78f651d6475a1
SHA17cd542a215e97b82a4d6fc7175d73b84fdddcace
SHA2560609a02ea287b37fad05e7855ddada680a84892892e486f0fd21c724206ec4c6
SHA512c2dedf0fb8049880fbcfd3e4455ca93d6d1abe6e3767ee8606f119b7193ce19ec212e3122dd423e8b5a2199103a00e9a51d9b63cd958044547722c541b5fd92c
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Glow\Data\Glow.conf
Filesize322B
MD5d17d1c48dd220ab32322c847f2397476
SHA1b522d8faf77216e24dad109858c1c6b6c94938b6
SHA2569424866d4dc3f01c70ec17b9a4fd4d715b3a81efc520ac72e8647d00deee4b72
SHA5127820d94b5b467b6b342fb4c91c406022da7674a1c1c34e8deaa016afeac5f10cd1d98403cc226c7fadb516cc5024fb677023271cf0a5ca3524b981c0c8e11deb
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Glow\Data\data.xml
Filesize881B
MD5c787222397eb2d14a6071eee02bbd0a3
SHA1ec1ec8bb0acb1748530c7934bb23cfc0f9400628
SHA25689e1f9f1760f65a3ced17a88d54f7193de94272d503c1964687ad27c0f0a3fcb
SHA51231bdfd64b594b52c120a1407811d7d635a10d75f0ae53bf4bd32caac57c3e99575f3b8405bd4da416d8339ee35aec934e4b3f4d3e2f562f7736c02e10bcc7103
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Glow\Data\filter.xml
Filesize292B
MD522d22505d4e1a1db93be517d177c28c2
SHA1c149488a1527ea9f4a25e4321bc35bd21cd04802
SHA256c04bda43a6a4c2e16c728b5d5ea0a0614e87aaadb1607bb5b04f1256dea9116e
SHA512952246c9888b476f5da8385dd111c17a3677d78b67b96de1dcee363d0c2194c02accdb155ec3324815d46a869fc3f99feecb053351559e2362bee32ae5970341
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Glow\Data\filter5.cl
Filesize1KB
MD52112f46fe7daeabf04a0f969c13d50db
SHA1859e7d7db8f3afa2f5240fc054ccba846bab5d40
SHA2561edd1ae3375a54ba2356e99f8a2acd0dcb3fb702f54a62df20dce5376fdc376b
SHA5124f99fe892a43da5214c2a03231299d806f97e5b0eda941bb20f214f84531cdaf7147f38a26bb2295eb1d4afa147d5b8eb1bb66e4f4973ef3ceb804327dba84d8
-
Filesize
11KB
MD58ff150746d88b967005b07ac0203e22a
SHA102e64ee36c1b0c83a08a3b4fb66dd1b209a2a184
SHA25630470c0c64c55ad036137747f7425acd78f6afe06ff2361b97a88f0a221959b2
SHA512d45e5025c734f0243e16014fb7ab9213f1570c0b75cacadb929f74ee0b9b6fe09e7308699f8896b4bf5844e5f694de0c70b08810f1ac7738e77faeaa59b36aa7
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Glow\resinfo.json
Filesize811B
MD5ab5aa38d243315acc65fef52a0a1a0fb
SHA1853816b305720855f4ef93ecfc21a197f6bc373a
SHA256e981f4c1ac881023d92d837f55b48f0635f05be5481c5648d0513153090d6969
SHA512106ef03f48a3657a76246a4533fbdbda855d83eb8cb99e4a642dca448dfd47fa7dcbb0dbb9eb74b7f065e7081ac5ec6e1dfd0034e57d9afd841395d5a93278fa
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Glow\thumbnail.png
Filesize11KB
MD58ff150746d88b967005b07ac0203e22a
SHA102e64ee36c1b0c83a08a3b4fb66dd1b209a2a184
SHA25630470c0c64c55ad036137747f7425acd78f6afe06ff2361b97a88f0a221959b2
SHA512d45e5025c734f0243e16014fb7ab9213f1570c0b75cacadb929f74ee0b9b6fe09e7308699f8896b4bf5844e5f694de0c70b08810f1ac7738e77faeaa59b36aa7
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Mosaic_f3\Data\data.xml
Filesize1KB
MD58579c3a1f8e499cce250d47eff003f47
SHA1866207cfbaa6a1b36f03f3e141193fe74386fefe
SHA256141c7bdaa59d9e44591cb43041ff35db973dca777a6c02f38e846e6859b69f4f
SHA51214d202755cbf4a14b4fb3aa32b49f1d8c59d3019c4492220c1c74a05e730d4a93e92fb3cf1f4a3c815eaa0e53a30c55e6eba9b9b9c8fbfeeef1812564c6380e3
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Mosaic_f3\Data\roiBlur.cl
Filesize14KB
MD531a122398cb794cb74c6cfbfef845ee6
SHA160e97eff3ffdd80568be4cb04c03b53fd01b3e4f
SHA256c0fedb247c3d805daea25966a43a9f01bb7d91704eb751c7fb0c137218f9767c
SHA5126d707bc064385d86f0151abbf5f632447cef30fd5f321753d2412022ee05d27992eac92fe4db9898fb6e76eb7a43c01ff4c0c8ac501de0c3aa3a25966f65c03e
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Mosaic_f3\detail.json
Filesize1KB
MD544c20ef83f7e4e32610f95f9e3103836
SHA1d544c5e1e012602fa552f8c2d1812ca21edee631
SHA25640fb74afc9120580c881b9ee04d4bf8bd90722d2fd70957d231f79dc23addc20
SHA51298dcd9a8a0eac863994a654500a1de61a4b440fdabddacb207b1ad07010a8bb7b57ed324cca18146b245c62f6c4015fb3c8bcb564505d0b45c7f724e73bef599
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Mosaic_f3\resinfo.json
Filesize909B
MD5e4a4b02d84583c8e515b70b405915e1c
SHA1416d1d7a1894736ba762065f764b60b88369d6c7
SHA256c8fad0da8a3ddac99844803a98d0d4c48025d8691cb850e9652865db7cf59aae
SHA5126412983eb9ceb75663a3934550841abf5cbe1af9edac5878a5bbcdfa227b56416bf0bdb6e691360b707e58994cec10359a947f6cdd0b95938e29b90180282965
-
C:\Users\Admin\Documents\Wondershare\Wondershare Filmora\Download\Filmora\filter\3_Mosaic_f3\thumbnail.png
Filesize13KB
MD5f9561be0cd045aff686a30dae71769d5
SHA12bd9248b73daad3750053493ff6597c695e379bf
SHA256169c59fb50533275b0d577d1314bd56f3858fe1a00d2b2608fea294afa440eee
SHA512439565d661540b1a555fc6e2e0375f8f0b10fcfa8843a82c7067aa79afa3962d81bc4f0933d9917d937a6b48cf9102aed779252e01122d80a4ef4a6c75f75f9b
-
Filesize
29B
MD5feab0c4fdc4baf0deb7fd33695adcbed
SHA122f35b32c7749e14861168bfe5530e5078bbe6be
SHA2567359b0465d62ec27a67d51fe527f9bf1adf5615a216a75b4f972b4253ba82f37
SHA51275b4064a9c17f12757ac01efa9d9933cf046ca257bd3d37a76862276ea8544d2113a68310ef9a1dcf0d113de1c1ab82de8022ea4ef7dd6ffd634b92a7be33568
-
Filesize
202KB
MD5665603698f4a865a873082309712aae2
SHA1b3f2c3d1d679181d9c080419b1dfe0563c518c67
SHA256b42085777505d324d56122f2bd6195ec3a6ce47030a31f9ce6b853c5fa8cd5a8
SHA5120444b1b63980f9b762e6e01b7cdc4efc2fd6f713887c07d8cf8b20ab2582f611e1c8434f8b59b8ee4fb6dba497c2c1f80fc6e758dc02c07d2964dd6e1f0b6ace
-
Filesize
104KB
MD5943e0025c5b5c4e0cddb7a9cc7b7d123
SHA15dd92f9fa572eac7ebc467d8835c64af77dd37a2
SHA25643391e665a63b5e9e1288a3c608691f73ece57478e0655363918e8195d85cf81
SHA512cb42c329e0d5f01a224e4e5b89b4ccc54fefc658d37caea40198f4483e5387f08cbdd0e85af7b0618e6ec72c5e5874098c5946bf749c218978003ad99c5fa852
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b