Analysis
-
max time kernel
296s -
max time network
269s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe
Resource
win10v2004-20240226-en
General
-
Target
42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe
-
Size
261KB
-
MD5
e381028b496c601a9e0024d3a10b8d0e
-
SHA1
bc28c3e44f65bec3e9fc0e3112027a9ade6969c6
-
SHA256
382e891853d6e7cc04ad6c569b64b2d6ef09d2b07740e15282708b322c3a2a6c
-
SHA512
7c90bcd7a136288e9ecd819e87a857009ca5802e0a0e9aff034cdb1ea7c23688dbc0ed074fa2e9dc7cf9ddabc9bc3fdd935e97e08665cdaf3bc0695d919fbe3b
-
SSDEEP
6144:0eBlISBwLaYlW8n0WkmpTKLCldp47wifieoajIOi1Ab:DB/eLXlW8n1ZKOLdUn4A
Malware Config
Extracted
mylobot
eakalra.ru:1281
op17.ru:6006
ashfkwu.ru:9821
pomplus.ru:7372
fasefja.ru:3410
hpifnad.ru:3721
benkofx.ru:3333
fpzskbx.ru:9364
ouxtjzd.ru:8658
schwpxp.ru:2956
pspkgya.ru:2675
lmlwtdm.ru:2768
rzwnsph.ru:5898
awtiwzk.ru:9816
pzljenb.ru:3486
yhjtpyf.ru:3565
ogkbsoq.ru:2553
rjngcbj.ru:5655
jlfeopz.ru:4698
wqcruiz.ru:2165
dtbmosz.ru:5482
cedzwym.ru:5178
lfodgsy.ru:2787
kyadfij.ru:7727
sqzqfpi.ru:6183
bngkuxd.ru:3656
uwbdgwk.ru:9788
coflexo.ru:5788
dtisylr.ru:3414
lnxjwru.ru:8822
zgplspa.ru:5944
zhxxatz.ru:4692
uirxfpw.ru:3795
ddmysat.ru:6971
gwkyldh.ru:6439
nebcigp.ru:2656
udgsdda.ru:3787
deosyae.ru:4487
eyusuku.ru:6718
yeqrpiu.ru:8994
qqwyalf.ru:8479
ohldijw.ru:1393
slcldlk.ru:9813
cegbdrd.ru:4317
ttjyemg.ru:8947
coezoqc.ru:9952
gokumtm.ru:6351
wlxlunm.ru:5266
fqqcwhi.ru:6447
eswujje.ru:4626
xxlncuh.ru:4322
zboxkzt.ru:2557
ahnmlsh.ru:4668
qgoktpn.ru:6725
hyzaifx.ru:7547
cesejhl.ru:4629
xfaydww.ru:5496
trlpqoh.ru:8289
atwirgt.ru:5353
wriymdo.ru:3342
dxoyayx.ru:3438
fsgxnnp.ru:4124
gokhdft.ru:7267
gsuaodq.ru:2438
xzoswpg.ru:6487
umwdrhs.ru:6433
efgjeph.ru:2344
rmrfdka.ru:4646
lpedkeq.ru:2247
zhwtbep.ru:9518
pwpoycz.ru:2639
txykchz.ru:9881
qtwmsfn.ru:2911
fjbpwlp.ru:8513
pjrurrp.ru:7647
fnygihe.ru:6493
inuedbr.ru:4493
tlbfmty.ru:7985
aukdzhw.ru:2816
trdiacy.ru:6465
srhfgzs.ru:7227
gjocmdx.ru:2982
zrfezjh.ru:7716
xoeihot.ru:7338
oirqzku.ru:3921
zwqlmae.ru:6893
xfsbbft.ru:9361
xntsxno.ru:3691
esxsxqy.ru:3642
rngmdcn.ru:6296
cwrrjzu.ru:6412
aqzmtyx.ru:4566
gnzqowj.ru:8254
xbnodqo.ru:7154
jrsakgt.ru:7437
mdyxzrg.ru:7329
xjkhjaa.ru:4998
tzobylw.ru:8844
kfsdypf.ru:8812
llfbdxc.ru:1398
ymamust.ru:6947
iecwtot.com:9788
odogltu.com:4386
dgiyfas.com:1878
yjyoafd.com:5314
awaosyk.com:6945
gxzwxyi.com:7818
byytbao.com:4738
ahstbxa.com:1213
hfqsehb.com:1988
efdcdns.com:2338
dabweox.com:4126
pezcgnx.com:8277
injkamg.com:5295
qymahqn.com:4826
kzzlnkf.com:9359
jazzham.com:3243
yqoyhwe.com:6418
uwejurm.com:2131
xfhkcus.com:5577
nlblxiy.com:9414
juiozwx.com:1219
ugpmrum.com:5229
oaidpsi.com:8438
dcqesgc.com:9224
wxctcrw.com:5913
cotrokd.com:9444
ticfptx.com:1156
qgkkzlg.com:7889
fpucrfa.com:9179
tbsnzww.com:8479
gakkhek.com:3991
uanugod.com:7856
kjyzegn.com:4857
bzjnbxl.com:2999
zcflfhl.com:7784
wxbksmp.com:2928
kkwdswu.com:6178
oyqqsql.com:8886
kiidrms.com:4473
ejbgrpl.com:9941
wbiougw.com:1625
yuoxcci.com:6898
upcitje.com:2846
aleukrx.com:8547
ypawugw.com:8428
oezjmkt.com:4248
afnbycy.com:5383
rktkgnl.com:9155
etqzdnl.com:6993
juycste.com:9145
ewresus.com:4761
lpmjumf.com:3941
wldqfhi.com:6943
tkoknzo.com:7132
djwyapw.com:7977
khcikch.com:2329
yhefchl.com:5174
dcnrmbo.com:7117
jtnmuld.com:1657
gmnabqj.com:8845
fpxbome.com:8115
rfwtlxl.com:7784
uputsdp.com:5644
qjfxkpl.com:6826
hxfxuuu.com:2164
tubizhk.com:9327
irakhgo.com:6214
yfrkwyr.com:7946
ixotiot.com:5934
zsklatu.com:9384
tcgxhoz.com:6199
xaguysc.com:5444
lobtkhe.com:5588
nfuozol.com:4242
mymjcct.com:8992
xewukyq.com:1538
gaxxure.com:5544
buyexsr.com:6675
pxjcugo.com:1794
isbumkw.com:4647
wpdeppt.com:8373
sstsueb.com:9413
bzfztec.com:6773
lcysuae.com:1576
pjaohzi.com:5582
yjixtbp.com:8666
bkpbhtn.com:2689
ljnfmmk.com:4571
hujgsks.com:9819
expcofy.com:5281
bmterdk.com:4827
qqmuisx.com:5159
jgfiadq.com:7565
alsffnw.com:2983
cocdpif.com:7591
jyppbor.ru:3485
nugisfp.ru:7689
amfnaui.ru:5418
wshakrt.ru:9298
exnhamw.ru:8755
dlcmbcd.ru:1791
takhnqk.ru:6585
ccnkngq.ru:4794
ggcggux.ru:3796
kqgjsnb.ru:6677
pydzqce.ru:6766
kwidwap.ru:6597
dgpclgy.ru:2679
fkhqrqc.ru:3314
sabmzhq.ru:8294
ezwaeqs.ru:8522
znntfzo.ru:4533
ojyoghr.ru:5587
kjkewpn.ru:9882
bmejaqp.ru:5799
nfwppfx.ru:8152
cmchnlm.ru:5476
imrtyde.ru:8179
hdnfuhq.ru:6387
qeqxpng.ru:1158
attcddz.ru:5291
ckeldra.ru:3287
ahuykif.ru:1235
elbanza.ru:2336
ufjtazd.ru:3716
icligpc.ru:7165
ddfaagk.ru:3684
lhkoczo.ru:2658
bemwzel.ru:2562
tmutnbl.ru:7396
ixxdbsq.ru:9448
fxhgrik.ru:9958
rqhzzmd.ru:7611
ycslqlb.ru:5617
mxmtmim.ru:4447
taltbdc.ru:4439
aqeogjr.ru:7162
ixwphir.ru:6781
tqpqdus.ru:9532
sdaqawu.ru:1376
ybrlhpe.ru:6379
cjbhkao.ru:3977
etqpmtq.ru:8791
zfsuauz.ru:5699
nyttyrw.ru:7541
xgfmfdk.ru:8827
yubseyf.ru:3233
bobfetg.ru:8837
qndonjo.ru:1813
gtqxacm.ru:8852
rrwmzwy.ru:7592
sbanafs.ru:3963
lslactz.ru:4519
kxnwrpb.ru:2546
knkoder.ru:4492
wfzidwb.ru:6613
pudtfwo.ru:4936
xdmmchm.ru:7161
nfaadeo.ru:6644
jatwcah.ru:6676
iblipcr.ru:2336
jonyotb.ru:4588
cehupwj.ru:8823
sadimow.ru:3654
ogubkup.ru:3714
ixbmeky.ru:8499
baeozef.ru:2337
gpbeuwb.ru:7923
sxpobet.ru:4834
qdrccob.ru:8782
swncgbc.ru:5475
mwpqner.ru:4192
jtiiijc.ru:3138
mnrcbxj.ru:2669
zewkzwg.ru:8181
frlegsb.ru:4228
xolanwb.ru:1157
llunbdh.ru:5371
ksmzkji.ru:1261
yhemqfh.ru:4468
hephgzq.ru:5883
ghrrtiu.ru:7118
nbkbale.ru:7325
oijlmxl.ru:2548
esadarj.ru:4541
ldwgdgz.ru:1436
gxhnlsr.ru:7335
jtqfmto.ru:9745
pkfzihi.ru:7133
exunbjm.ru:9739
fqwqcje.ru:3469
nnfrcft.ru:4394
eaflknp.ru:7276
yczxjab.ru:4357
gzgsylu.ru:7946
xlefzdz.ru:3385
fyfuska.ru:6788
erpmuii.ru:4933
euhnqjt.ru:8156
lkthqmr.ru:1324
gewjyiy.ru:5192
giksmcy.ru:2691
gekdcdj.ru:2428
xwrtmoi.ru:5726
djipobz.ru:6879
phezrnz.ru:4623
gwebrlo.ru:5637
swwcrcr.ru:3126
zefjrtb.ru:8377
cpudseh.ru:3123
bdgkfeg.ru:1831
otpzcan.ru:2189
recsqyj.ru:7742
dguwsbl.ru:4668
mytdchj.ru:6123
zfwdkju.ru:1973
zkkibgs.ru:5852
hqmondd.ru:7936
lhjsksp.ru:4889
yggseaj.ru:2968
gjfhigf.ru:6714
ytzrhfn.ru:7741
qatlwrw.ru:9225
ldnkqrt.ru:1866
kdfptak.ru:8247
jbujluu.ru:6841
uypbgml.ru:8679
jzdjtat.ru:7755
nmzqnic.ru:9982
ysexzqp.ru:9688
ulfjfxf.ru:8964
imygddx.ru:6268
hworjgr.ru:3165
lpacway.ru:1116
fsuxufu.ru:8865
wbllihr.ru:3977
mwtxclf.ru:1538
jshitfi.ru:9291
bhzbplx.ru:1942
lmkcrom.ru:8648
fbrsoll.ru:1333
oczzzxc.ru:8464
jjhcmht.ru:6491
awnurlo.ru:6539
eialwnq.ru:8981
acmmecs.ru:7279
qwbygaq.ru:5447
wuweotb.ru:2564
pxagaxo.ru:1468
tnsogul.ru:1957
yyuojrq.ru:6446
hhxrrur.ru:8915
rcqagfk.ru:2283
gjynpza.ru:5566
opnckzl.ru:9861
obtpxtu.ru:8512
ccgcsad.ru:2519
ketzrlh.ru:7143
sxjleym.ru:4179
knosmzq.ru:1554
ftjgoda.ru:7582
jocnwob.ru:4865
ewytcur.ru:3216
szzekbg.ru:5311
xwtdmin.ru:2268
ykuaklh.ru:6248
kykdafl.ru:4667
yrruqmc.ru:6632
lbpzbwu.ru:6689
yyizowk.ru:6515
zqibpzo.ru:8925
lhutehx.ru:8916
fezqdaw.ru:7672
nyzosdy.ru:4825
rzqkpmi.ru:9643
qwxynxl.ru:7999
slpfgox.ru:4141
ijwggxz.ru:2471
ledsmih.ru:4519
bfzkjsd.ru:2576
fuojgch.ru:6145
oqyzzbl.ru:3199
jiwbdyo.ru:9812
pugkngx.ru:3165
qbyoiin.ru:4265
miicskm.ru:6196
gpmfppx.ru:2454
mkialie.ru:5333
lzqwbfu.ru:5628
lsnidky.ru:2532
xcsgsjs.ru:7953
tqxbure.ru:4771
ontnsui.ru:9953
nudqkub.ru:1675
zrbosqq.ru:7696
ousmbdb.net:2571
coaazbs.net:7113
jxezfur.su:5977
piabruw.eu:7993
cndnagb.biz:6314
ozsbrca.bz:2567
tgedezf.tv:1252
wbxsljd.org:2143
suaxltb.org:3333
txknxnp.org:4646
widbnfml.net:3463
qjszjmht.net:5722
gbqosyht.net:6435
muwsotge.net:1957
ijynjghu.net:1658
bzsqndui.net:1539
jblpbiby.net:8489
jyzkflaq.net:2728
zhquqsrh.net:4978
kpzhzeen.net:4473
jpjrnkix.net:2853
fejsqrcf.net:2686
axmjcbai.net:6369
gubunpom.net:6583
mpalxmot.net:2188
hyoqdhne.net:9886
udjdsict.net:4388
tonzqkfa.net:5414
zddnhant.net:4155
eglrlwps.net:5357
bxjrisjy.net:4459
mhsnxnkb.net:5724
nibuquba.net:8553
zpnjtnyu.net:9612
ymjttirr.net:4617
orzkjedk.net:8754
jrxcrfbp.net:8728
wdibzeog.net:9952
gqesxetc.net:6126
huukfcpp.net:9426
ctfkeuqh.net:9773
srypsstj.net:7548
meenacxd.net:6964
zfmgxyby.net:5325
ipcrppnu.net:3633
gifbpzsi.net:7463
wuaaphjy.net:8679
dgxuftsn.net:6855
yhwwhslh.net:3859
kolyroro.net:8672
udriklye.net:6255
dkgtxirc.net:5491
lbaizkfo.net:8958
rtkntqob.net:2819
jmfhbjbo.net:7731
ftgrwlwd.net:9676
jwdlwrrs.net:4583
unbhxddu.net:8356
qsqtadib.net:6767
gjrnplpe.net:1388
tprqornh.net:9723
ocnilbnd.net:9456
xgyzqpzh.net:9539
tlmcplxk.net:6554
grzcuubq.net:1841
uqapbzjd.net:3453
jrpbuuxb.net:1322
pcmftuby.net:5223
wfzwjkfl.net:1242
bbadzdnn.net:1329
bhkholoc.net:5179
xldkazjb.net:7175
hdwclykg.net:7848
ueucxars.net:4976
mmporhdy.net:8975
wgkyinht.net:7796
ctlkbeun.net:6721
yfdmqzmx.net:1823
jccqfnim.net:3879
fgbrmcwh.net:4125
fuibykao.net:8755
jthkjfct.net:3435
dliqeerh.net:5734
jnkmjwcb.net:2664
odwjnnuq.net:7292
fntlgzud.net:4637
arasqflo.net:8326
ppawfxxr.net:6357
lrqytctc.net:4546
zlzgiuta.net:8572
yrenoekw.net:8293
rffroddi.net:2389
eglyuwao.net:8257
ceezkaue.net:1237
jtuhnjyb.net:7662
akdlfbgy.net:4183
bncjycan.net:9185
cnkmzbok.net:1672
guynsjqc.net:9243
kzqnzyjs.net:2472
jmftmarj.net:4255
hsiwwwba.net:6675
uxkeyhod.net:1942
zxesneyp.net:3663
bziesaye.net:3879
subpkdsc.net:2672
lktcdhsc.com:4322
xsnnouxn.com:8341
rxmtsfwr.com:2859
bdbjfaiy.com:3587
spdjotbw.com:5681
lwuohtfs.com:4332
lrifeskb.com:1364
jnbuzdsj.com:1582
aybuqwns.com:5354
uyiynfdg.com:6658
tpuzgcjx.com:1672
euynheug.com:6579
oikdrwrt.com:2666
ajknoerg.com:4112
iehqrpew.com:3891
cflyucjs.com:1118
okjnznul.com:4476
cmcmistx.com:7696
zoiauqxo.com:6142
xidszdqf.com:8777
ryftnrek.com:4292
wurrgkqu.com:5867
mxylguqs.com:2248
abtyprgd.com:4394
ykrybyyy.com:5331
jnlsqolj.com:2432
hpjdpxhn.com:2851
cxiqrmxb.com:5824
endeioun.com:1358
dyjtlhdy.com:8497
qzcmqeye.com:8229
mdliouct.com:2163
imehzptq.com:1956
fkgdnmop.com:2814
nnaxlexa.com:4943
nlxggyad.com:6432
hujlhwqw.com:1645
ghfxgxtz.com:9972
jaxwsikr.com:5868
ixhiusbo.com:6273
nxzjhixa.com:1226
llcfmsmx.com:9181
pozlkbcu.com:1554
kajcnodf.com:1747
fqxxtfez.com:8954
hpyyiabe.com:8317
llmdwapw.com:4249
wkpiyffp.com:5449
xkzxiskg.com:1551
dszuhygq.com:2292
hfxpyhzt.com:7953
ytmewsdd.com:3286
pznzstai.com:9386
hzwwholr.com:5853
irdmnkss.com:6817
kqjiibgf.com:5235
oiqhfate.com:2317
isrnaili.com:3954
orzalhri.com:2858
ypfzqugc.com:2187
guduiwle.com:3782
czdbedlq.com:8788
satngkrc.com:2939
rhfjlafg.com:4665
enkwxewz.com:7966
hmboassc.com:5348
uxlwfhms.com:4832
hzzxkefr.com:7293
uujhtnpm.com:5269
rknyjitw.com:2812
lpgnaxon.com:1162
txarhwmj.com:9975
lodauofo.com:7787
uksrosxf.com:7187
ioskxygw.com:3673
hrzzqabo.com:7134
apdiskpa.com:4372
sgqrguhc.com:9715
jupwgffh.com:4833
eoihwhsh.com:6788
bcuiyaik.com:4722
feejexze.com:3814
lkpftdrg.com:2677
ragawmap.com:3186
otpemngc.com:6729
haucfcjl.com:6849
jridaafg.com:2759
atoreyxb.com:5976
umupwrks.com:1112
izpqfqko.com:4714
pydyojke.com:8497
zppjpssx.com:1863
hphdugbr.com:8196
ypbnsmkc.com:4548
ihaculzy.com:7273
zizcigfq.com:8923
nfrqneii.ru:8823
plzidkwc.ru:2874
epokrlpm.ru:7211
ymodnpbm.ru:3595
zozqcijm.ru:8758
whidhlhj.ru:1137
enqptaro.ru:9585
dnkkmsdk.ru:8474
ynkppmys.ru:2861
yncumjgt.ru:9944
qxnnyojs.ru:7394
bfmygact.ru:8457
kupkcalu.ru:5252
tsgpjccs.ru:1694
ygmskriz.ru:2829
faqerplr.ru:8557
zodqeasa.ru:2862
trnfttwo.ru:1362
mbxnqkpa.ru:3996
gomfjthg.ru:9425
onodfwcp.ru:6485
ubiknoew.ru:9424
oezqztpr.ru:6382
mxgnffgc.ru:9861
mmhdynab.ru:3797
bqpgmrdt.ru:6341
fguoszyh.ru:5169
bxnzpnjo.ru:4815
gslukycn.ru:9898
utsoiydn.ru:2351
daztbzdx.ru:5987
qpljfpxh.ru:8495
khrpziyg.ru:9157
jqkhhbws.ru:3153
kpreqrsz.ru:6786
lugxsxgl.ru:5475
kkdnbqyx.ru:5424
zunujdzs.ru:5313
qgnoxmck.ru:1696
acjfywyf.ru:6512
qxhsbzht.ru:5334
riyjuueb.ru:1784
qeiyjmgf.ru:9879
bmdgkhgy.ru:4186
bkuofuwo.ru:2254
ellmhzxp.ru:5915
gkatexrr.ru:6347
kqwfpwiw.ru:8935
fbkiknuj.ru:4882
qrtfqtji.ru:7388
muqoknkx.ru:8166
xjldmfyc.ru:2559
dmwihrxf.ru:9983
sldptgij.ru:9431
cucdfcsx.ru:5681
exneoohj.ru:8187
dnqlulxl.ru:1195
iekempcm.ru:5757
pkzzsnbk.ru:6222
ojfctycf.ru:1591
rjbkkxxb.ru:7678
myxymodm.ru:4847
gtprulxu.ru:1311
dbxneqff.ru:2369
kzxeomuc.ru:1362
jpdgcygn.ru:9726
rpwgznqx.ru:7745
huglbquq.ru:3399
uoklclma.ru:6777
ykxteoho.ru:8271
zlwogtoy.ru:8722
uncmswyt.ru:3745
ewgxnamc.ru:8611
yfyddgbp.ru:5349
kccpeane.ru:5358
rkefhnnb.ru:1798
noelkwbq.ru:6188
xxacpreh.ru:7662
mzgbkfag.ru:1569
bidtqrkt.ru:7777
lrdzaout.ru:1192
sqpclazb.ru:8787
okxkyxwp.ru:4211
zhizinxe.ru:8869
zwzjcytf.ru:8124
xqzoogkp.ru:2681
zgpprkgq.ru:3982
jttwjqza.ru:9285
kticyhgf.ru:3796
aaueuoti.ru:3996
wapfmkmi.ru:9797
xaxzdpxu.ru:8217
hpplezpn.ru:3146
ymgmxpwo.ru:6331
uhywzhzm.ru:1317
unowiegk.ru:7283
fjtasqfd.ru:2357
mrwaccmb.ru:7979
cfzqlhbd.ru:7313
sluerqsd.ru:4628
rdgzlqhf.ru:3528
nndwjzri.ru:4954
guonsguw.ru:9737
uuwlalbe.ru:5563
cqsqiluw.ru:4681
nowwdukb.ru:5625
dixpbqbi.ru:1884
hzudzixf.ru:9671
kmgndaij.ru:8557
skqgzili.ru:1578
qpdpzdcm.ru:3524
ncsdztpn.ru:2163
fquchbyl.ru:5562
xzwrurfg.ru:5792
umqccyqa.ru:6497
xijdajfn.ru:9833
prjtynbx.ru:3388
ebozoutc.ru:7217
kfncedxs.ru:8341
njcyrfhz.ru:2559
xjupochp.ru:3399
znmdctrt.ru:3771
bttgtczy.ru:1144
kruaxgtn.ru:6424
promdemh.ru:7883
ywozcftg.ru:2545
xfxhjxer.ru:2313
zaqousxa.ru:4443
kquosqjp.ru:6723
qigkyubu.ru:8653
sebkzmrk.ru:1635
fpeirmyx.ru:7839
sicqpdor.ru:6238
qoaunlrq.ru:6556
pasoejob.ru:9167
ltwlxiil.ru:4332
bihnxhkl.ru:1953
ixllirtx.ru:5553
wnpaatln.ru:2722
gbhiolil.ru:6281
ihmkqfxz.ru:1259
olcsyeeh.ru:8676
yzrmraod.ru:8564
ftxpqtyf.ru:2581
ecxfpwlu.ru:6522
zbeuhamm.ru:4954
jrwrscox.ru:1181
zjuuqjwf.ru:1826
rhobekxn.ru:5487
jcrribai.ru:1825
liwrnskz.ru:6192
zqurqugi.ru:3561
fmoncrhz.ru:1596
beetxiij.ru:1214
hijgnafy.ru:6326
kjekdmsh.ru:3488
hulboiuo.ru:2718
iloesokc.ru:3312
qgncxqeg.ru:8382
aklcrcda.ru:9419
nbnkamox.ru:3158
pzdefglk.ru:6571
sbcoklho.ru:4875
agnefwla.ru:2311
ninzuwow.ru:7638
fzhlhfta.ru:7619
dsgslnog.ru:5778
bjitmdsr.ru:6422
pfjdnjpe.ru:2338
emlpjbnq.ru:7955
rjiuttmn.ru:4118
xowafmuu.ru:3988
xfkpjiat.ru:3676
hmbjeiur.ru:4878
kuxsliga.ru:4646
liwltjju.ru:5598
yfwzkxpc.ru:7944
uihfnbjh.ru:5656
ismfrtib.ru:4295
pixkihth.ru:3398
wsbwfmpm.ru:5111
leamldny.ru:6656
fhokrood.ru:2292
bodkkfud.ru:3686
zickxamo.ru:8196
djqxwndr.ru:7249
tkjepnae.ru:1578
hzfmyasf.ru:7898
ybssxlts.ru:7313
bszykufq.ru:4646
eatijcry.ru:8662
gpdpdwam.ru:2659
hrkdwazf.ru:5356
hzfeomei.ru:6766
eqcfprpl.ru:5271
ngdbilhn.ru:6428
rhyonsnx.ru:6417
zdppgkkz.ru:2248
ypdbkeoi.ru:3996
znnsxnfw.ru:9329
limzorog.net:7398
zxoexbgy.net:7866
toydieze.su:5988
pksozeih.eu:5271
sjlqqjwb.biz:7637
swizfzyc.bz:1129
frrkdlwy.tv:4216
prwangyk.org:9463
ceguyepo.org:7538
hfasdchg.org:5443
tgoswjqh.org:1198
ddwdeszt.org:3756
qfhpkqjz.org:4958
ethepgxk.org:6323
wtqikcca.org:2185
ezijzazl.org:9294
tbxuiabs.org:5681
cnoiolph.org:8578
mpwcucbk.org:2147
jjfoknti.org:7133
cqxbljoa.org:5388
xcnbsdsm.org:8478
nfpzrnnn.org:6496
doamfsml.org:2552
gtxgrfwy.org:2836
owfdoure.org:9152
enajlnjs.org:7787
doggfxjm.org:8743
tjwxarre.org:6357
xmubagbc.org:4374
djkoyrga.org:7995
oesofetb.org:5484
dycolcob.org:8563
nlnylxjf.org:7287
fsmylhnf.org:9817
rpdgzdwa.org:2416
kzcdufre.org:4914
sbphsgya.org:4321
ljcnowcr.org:6319
atcnzboa.org:5584
fdmiqnrp.org:8884
hdzdrgtw.org:7336
xybhbjgj.org:8733
xryjhjms.org:1451
rytycwlj.org:5732
lghnjpmi.org:5158
klclqsql.org:3738
pwoyozsh.org:1761
gwkhsphs.org:3861
sctxqggr.org:6356
qqsbbecl.org:4988
cmjysquq.org:2448
ltkopcns.org:6344
tzzgirje.org:9724
wnccrljw.org:9841
yffabknz.org:6483
almiwzli.org:5578
gyxywill.org:2542
xkuctmhi.org:9858
eccbwysz.org:6549
mttosqgz.org:7976
tlnnexgy.org:6841
upaiunkd.org:6821
ffcpnuli.org:1292
hfqmmoww.org:7813
spdrstkc.org:2863
coyiapzm.org:5632
pzjjicka.org:3972
odwogsuj.org:4116
elqdhjib.org:5395
fmcepxsb.org:6981
clwifmgs.org:1527
ahbbuxck.org:2523
qnagwrgr.org:3249
rlyxedyd.org:3547
hyiiuxff.org:5876
qbaipacx.org:6131
ebskiixf.org:6576
azwxfxcf.org:2465
tbcifras.org:6666
zweimrkx.org:4346
zmyhsenk.org:5383
hfadecwd.org:5446
tiyxybwh.org:9423
pouwrluf.org:2961
mtbkurqf.org:2325
hpdtggzs.org:3943
clblsmdc.org:4712
exrwqfzr.org:6984
fryhagas.org:5986
jznjkydz.org:5521
auwsmdjz.org:1288
iqddymlo.org:9877
mlpyimma.org:2659
dbyjadsl.org:5819
gpwebbdr.org:4122
ngsibbpr.org:3768
luafgtud.org:4616
nthixnzt.org:6585
plofeqyh.org:7435
wcfniziy.org:9835
xmehonpr.org:9287
osqjdbmw.org:1696
dsjsjean.org:3543
aumoxfaj.org:8314
ftuueofh.org:8115
jmfqbdjj.org:9485
quiitzeh.org:3573
cskkjblx.org:1646
cpindonp.org:3818
bqqsssdr.tv:2593
wjfodgmj.in:1577
wcriyesa.xxx:3419
iydmjgzl.us:5873
oroeiodb.biz:7785
gzlbaowq.co:2326
uiqsaemc.cc:1263
dxarbdho.net:8598
aegxeken.net:4825
mnpfsdlu.net:6321
ktheexrh.net:2171
qxiezqeh.net:2632
gubwplma.net:3527
pkuoqtob.net:1281
uilajqiu.net:9993
bygcmbue.net:4751
ocyhcihr.net:7831
msxdiwen.net:4848
spzdzgud.net:1179
tmypjhge.net:3771
zhwifxkt.net:6687
mggfzygk.net:6464
jjxrcegi.net:4331
xyplrrlj.net:4717
glwympyo.net:2816
klpdrawm.net:1485
kuikiihg.net:7512
smcuawsd.net:4854
ibhfnkon.net:1394
stkgzfoh.net:1297
ksxigcie.net:4331
wccgxlzq.net:2373
qdfznnac.net:4297
ccfnttto.net:8324
cgguocaw.net:3915
rgmnfcee.net:9485
pxwspkkn.net:7882
oaysgsdo.net:5928
yzyopjsn.net:9765
wtxpgpqu.net:1682
ejicubxq.net:8153
tqkfwtzs.net:3774
smyesmwi.net:9111
phtdopqm.net:9631
cimhthgg.net:1398
qmiyxxwh.net:7526
einbskxn.net:7438
fuidrsar.net:5956
gfwflpur.net:8788
wnbmfxhd.net:7685
sbjorjqq.net:7261
kowqgzds.net:7784
kiyaxnxe.net:5575
swjqlwod.net:8842
lfktsebh.net:7143
rkrurzph.net:9539
wyptwxup.net:9358
fcepqijw.net:7674
ofzcqtdg.net:8944
quoqntsb.net:4264
lzjoltnk.net:7769
zlbytidj.net:2736
pbhkhfri.net:6754
lpwaasxs.net:9618
ibuelfuk.net:7389
aljlbcog.net:1358
zkysqnng.net:6113
fybkenru.net:5444
bjzdpfnx.net:4549
wuuegbae.net:3925
hkaeoquj.net:4671
fceajspp.net:4461
blrkdpie.net:1542
zkubeppe.net:1874
plrwzhpu.net:4465
mmcisbgx.net:3877
zbalzusr.net:2839
fctybcye.net:7696
cfotfpcb.net:7311
blwgjxrb.net:6525
eepygxrx.net:3819
conltnfb.net:1689
cjxnllac.net:3325
hadwulws.net:3887
xscsohsx.net:6866
ghqtjrtm.net:1646
pqdldwyc.net:3663
kapemmbt.net:2672
wpgsmtrq.net:1655
uizpktjw.net:9381
ungggfuj.net:4929
sriixedf.net:4337
jltttesp.net:1885
rfwehknx.net:6983
gfbatygf.net:5784
euzedayz.net:3287
cmhkznyp.net:7484
axlsqocz.net:3737
fnqcanxw.net:7484
lmjggtuu.net:8972
ynyxlsoy.net:1654
nlktsfjo.net:7334
hrtuygtf.net:9136
pwysqgri.net:6283
uspaeloy.net:6948
zewuwkrl.net:7457
nheoqesw.com:3616
jesdggup.com:4416
xnnytbub.com:6256
hiafodqh.com:6729
abyptyuw.com:9365
lrgjfjtf.com:8768
xohdclns.com:8646
hzpbicou.com:5568
ayaxqrmq.com:6842
zjmmbwfc.com:3125
ojqgkaqe.com:1864
wzcdppwj.com:3516
nrjxxyhy.com:8375
uwkpaqwj.com:5573
bmnyahgg.com:5637
esapjqhc.com:1219
rznptjzp.com:7789
ajiwqbfh.com:1854
ffqtkexm.com:5129
khpfmkpp.com:1775
ydyljxyk.com:5462
dnjbbtsd.com:4956
zjrbsmyt.com:8891
zuxsbloy.com:4221
pdgzgipc.com:9346
rhrwdrgx.com:5896
wlxxebbh.com:7625
sygeulrj.com:4984
eiuwojyc.com:4238
ktyhgrjj.com:4471
efgsijkn.com:5199
qhsomdhk.com:9191
qlxrrlnn.com:1541
qcobjswy.com:2641
nuapotgx.com:7814
xljucbcn.com:6673
bkfzipgz.com:2333
xikzmoxm.com:4816
dkyrkaeu.com:6651
mzrlnolf.com:5388
qfgzdjmj.com:4929
yjrecqre.com:7621
dhskwijo.com:2959
kcywsrxo.com:2222
kuokyqny.com:9188
itutmyok.com:1364
fpnexhha.com:6168
eoordzgm.com:3936
iziobozb.com:3343
xqkwczpr.com:3245
ofairnur.com:9716
dupdagjj.com:8671
xgmcyiaa.com:4685
wmxiyowo.com:1336
rraaeuqm.com:3253
umxoztcz.com:7113
hrhugfzc.com:1668
kdtuyrqi.com:5258
mcwyewsq.com:5175
kmrmewyk.com:9789
btprkhof.com:2885
apzkjmga.com:8265
skyteam8.com:2175
zytlttky.com:1468
dkkoziha.com:7277
txjtezzh.com:4529
nunisrxw.com:4355
yscwiuft.com:3222
kryfwwuo.com:9599
tbathbof.com:9281
mrnmohku.com:7297
mwztczwd.com:5446
fqedxshk.com:4686
nsonehwi.com:3825
gljchbss.com:1866
xxnbmwxy.com:9445
jmjjcgxe.com:3813
klrfbwsg.com:7377
xwgjmkqo.com:3274
tbzyjrhw.com:1436
ycflczbu.com:1697
ufjyijuu.com:1433
dlykdyju.com:7537
sdeboyxa.com:4574
fbfgklue.com:6463
skinzusr.com:2368
xljcsgwj.com:2923
mdujbmqz.com:7459
mrgyzjgy.com:5569
bskswimo.com:7379
mmxyxymn.com:7411
kjzwmhfp.com:6588
eotpkezp.com:1197
xcwpedwr.com:8795
gtrcqict.com:6732
uiiokhcw.com:4468
dshnlbhj.com:6615
ckywwkqz.com:1565
podysois.com:1954
hjpqgxrt.ru:1666
moyiufju.ru:5833
rkdicbag.ru:5921
huwcqgwk.ru:9826
wuituzew.ru:1722
gfyflggy.ru:1848
pwpdeynh.ru:8769
epdumdyj.ru:2876
qfhdjzru.ru:6745
lrupxwxh.ru:3824
whsihlcm.ru:9645
xlmlutkb.ru:7375
psrpsunb.ru:4763
ewzrnsky.ru:2757
pymubdgl.ru:9728
djocwlel.ru:3143
dbsirmpy.ru:9714
ealihbbw.ru:8473
gptetmjb.ru:8557
xyyfapit.ru:8867
jptqiats.ru:2848
ztjgabjx.ru:1381
oqcstzbp.ru:4243
stlijuns.ru:9887
pdwcmhml.ru:7772
lykowcrr.ru:3484
itpjrwmp.ru:9392
espbbskc.ru:4647
uwbzbwws.ru:6852
diaypomj.ru:2899
kawiaayn.ru:7453
zoarmwwo.ru:1151
uaurlafq.ru:1959
mrzhgpup.ru:9263
knucizwu.ru:9483
ubonwkmz.ru:1276
sdhfwjku.ru:3343
mnmsbclj.ru:1922
wlmkxpou.ru:7493
gmbhlkbr.ru:2387
jmxcrbgx.ru:6684
wdzmekox.ru:8953
sxczqdlk.ru:6727
kykjcgrz.ru:9361
pkjlzjtu.ru:2546
lfbsxoyl.ru:6439
qprjzxif.ru:8942
gxdjltim.ru:8153
urnqsrrl.ru:1627
pbbidsgj.ru:9791
lehcuizd.ru:3696
zeoglcfg.ru:5293
byhkflwp.ru:6713
qbnzpits.ru:5613
klkfetfm.ru:7756
gykcokzs.ru:3569
paijmxju.ru:9128
cykwnxil.ru:1362
qykhmjrs.ru:5469
xjaykakk.ru:6818
kfghrzhe.ru:4717
fjmppybw.ru:5652
petixyxl.ru:6116
wqssublx.ru:1783
ebbqijri.ru:7269
fcwftrlz.ru:4332
gaqrswqb.ru:4858
ywkekluo.ru:5312
acouwdij.ru:6451
rkdtffzz.ru:9477
qgbtxxpx.ru:8147
ztopbtiu.ru:4568
ruqoystn.ru:9659
cozobcij.ru:2987
epicaely.ru:5253
htbtxdel.ru:1277
cpshswzf.ru:1138
adjroixs.ru:4812
ymoagxjr.ru:5752
budzcyka.ru:4219
kmeplhkw.ru:6191
lgzcpiyq.ru:3565
ecytflkf.ru:7426
pczobygh.ru:1942
sdlmpwrr.ru:5152
lgpmwrhl.ru:9376
pzzepzus.ru:9674
ycdfsbok.ru:9484
ipuxleyu.ru:2935
hspckajg.ru:2851
xfcpnpmu.ru:3457
xlskceds.ru:4821
ajltgqww.ru:5389
uicmbzwt.ru:2174
xayuyzfy.ru:8588
utbrmczo.ru:4945
nzzywglz.ru:7594
bmlsmzuf.ru:5543
axqxskgp.ru:9971
okreajxe.ru:6788
xeszumgr.ru:8952
gpqybejc.ru:8445
sgibommf.ru:4339
hqbuyetn.ru:2182
wpfyafqx.ru:2548
orpjshsd.ru:3257
xlmowhzq.ru:8296
lfsuxhxj.ru:3673
eukmxmlk.ru:7235
ghrdtmwd.ru:3194
dofoiyfo.ru:3492
kkwamujw.ru:5369
cyeosnzf.ru:4154
diyhxjqa.ru:9984
bjtajoox.ru:4669
txlhndoq.ru:1171
psshjlrb.ru:6815
wdllwoli.ru:3634
yetnkkqa.ru:2481
qnxtmrjq.ru:6945
ymuzekln.ru:3329
jewwryhm.ru:5111
tosfgiqj.ru:6949
eheotdpy.ru:1378
xtetrbwu.ru:7676
jwqeaekm.ru:9676
xniqlxso.ru:7122
uehpfxko.ru:4514
bhaxyxso.ru:6852
krnlqxmt.ru:3144
gcwpsikc.ru:8283
rasqhcso.ru:8493
nxhaqrkx.ru:4955
oxtutjfc.ru:6257
rjkejezi.ru:6722
djsatpkt.ru:2826
ylboxsea.ru:9561
rhrmjmim.ru:9785
ojphngsf.ru:6511
umrpsuxo.ru:3543
bmwljnnl.ru:7167
rkysppka.ru:4448
xtqxqrpj.ru:1634
hyppfmjy.ru:5828
aleuoptp.ru:9494
bbulfhyu.ru:7412
ubwrtmfu.ru:5689
iuimnpfh.ru:8285
ufselndu.ru:5958
glwkwmut.ru:5885
zaxcbsmw.ru:6539
ikbyojki.ru:5218
pcwzrugd.ru:8192
wxytmcqo.ru:9333
xbjzafzb.ru:5469
obnmezxw.ru:2948
cxzsznpf.ru:7688
gtzitahj.ru:7392
ircqxlez.ru:3479
sdqqpkyr.ru:6945
zkuulmwi.ru:2141
tkxakzaz.ru:7259
qqhsdkyd.ru:1869
fwtqypjr.ru:5921
csuhfzda.ru:3349
dxjaojzi.ru:2943
griyspww.ru:5667
kfxjfaii.ru:6657
fssumooc.ru:2425
wczpdgqu.ru:4921
wjtbmupf.ru:3541
gthfcqgx.ru:4472
yeqlcenm.ru:7623
qgtbhcbs.ru:4975
ydzuoxit.ru:2624
opswaxjb.ru:8843
kpptutbf.ru:9419
reigrqil.ru:6967
cafruyco.ru:1959
gdxisleb.ru:8141
oayluigc.ru:8614
bxozzyye.ru:4382
lnjtzsdz.ru:4453
yautpbsg.ru:1663
myogwpoq.ru:6459
dqqmabbt.ru:5779
zpctgbhm.ru:3392
czdhyobh.ru:2516
xfkyyfje.ru:1342
ysumlact.ru:5469
wmesrhks.ru:8817
ownxlrlu.ru:3245
jyudkhci.ru:1362
mihzyqyd.ru:7118
yocbjjqg.ru:9753
aeeipzyh.ru:2238
udxennsf.ru:9154
hleenphf.ru:5136
bddfaozk.ru:4639
bjxzalpc.ru:9971
tzuzsyfd.net:3318
otiifafm.net:3975
jmaudqif.su:7757
tktsquzf.eu:1247
yijzasrq.biz:6819
pnbrzljq.bz:4215
wqdgpigi.tv:8215
erlwnbld.org:1929
juculhdd.org:1721
kjjhnwjh.org:4972
ohxuxoct.org:3115
lblwunnt.org:4524
zqznhajz.org:4667
rfkujjhw.org:1155
aqgkndkx.org:7525
inokhrki.org:8192
umkepbuh.org:1292
pfuokfzm.org:9659
qfwkkojg.org:1188
oiicszdf.org:3848
lhatnjnt.org:6526
unzhfphb.org:2393
dyrshgfm.org:4167
foflisct.org:9888
mgqfqouq.org:9541
bfpzjmtr.org:2932
tsflxxid.org:7927
bgetacjh.org:1712
tpablqmo.org:1366
ngawypqa.org:4555
urwxrucp.org:5163
zczysufy.org:6752
uqwnmaii.org:1242
edlfsgpw.org:6189
xpjiynsx.org:4597
gnlicfdj.org:6426
hkmgbijz.org:8737
aaohwewc.org:3271
kggbdsdr.org:2559
bjctlyqy.org:4923
epegijhl.org:1535
qkqewkpp.org:2677
xxzzlfya.org:4527
wtggkyjh.org:1122
hpitwwwp.org:8948
pefnghne.org:3416
jjowfpbg.org:7581
mgoyghmk.org:1372
qfadxjec.org:1347
rheqxdzc.org:4296
qxuuymbz.org:1374
aiiagdej.org:2532
xmjpshhd.org:8542
hwhighmn.org:7141
xzqnbaiw.org:3323
omylzlxk.org:1753
lwwjenfl.org:4757
wwppxxby.org:1152
ugswdtuk.org:3396
gfcctzuo.org:8337
eqsgxnrf.org:4895
garrwuqe.org:8833
dinufbza.org:8631
cplieefr.org:1678
nhjssdht.org:3922
cwgxylkh.org:3476
auxogeou.org:2432
olqccxth.org:6983
dxqrdiup.org:2294
fjcmcsdm.org:9321
fziantsk.org:3323
dxzqlnak.org:4449
xljmlgug.org:5732
waamxuqx.org:8184
ttmaynlx.org:6622
ipqogpqm.org:3699
pjonlcxb.org:7735
flsqteel.org:9695
drjyjayq.org:6792
ijcmgxzh.org:3171
gowlouae.org:3984
wpniogqy.org:6749
ooxueobg.org:4432
gemddces.org:1451
kkzujdzi.org:5914
ulngrofp.org:1925
rpdylhqj.org:5298
pyaazxwq.org:9514
lhyzwjru.org:3721
Signatures
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2468 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F8539989-087F-8164-6FB0-8B6621E198D2} = "c:\\programdata\\{6443B1B9-204F-1D74-6FB0-8B6621E198D2}\\c9fc6126.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exedescription pid process target process PID 2452 set thread context of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
iexplore.exeWINWORD.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417190561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000089b5ce6aae4fb233aedb4355ec99e6504cacade58396e28944024dfda057cd54000000000e8000000002000020000000bf312855b64b944378040d0a57d4fd5b9b25b57af845fbe2762fd2fc46e0f30120000000a18a39200d5cb94088295b9f0eaf9433163a4fcc65fcbff82321bd6b805176e2400000002a1057c7feb1f900291c714c70b7a6d0eab1ed736a5ae76219432e819fe26fc33b1299b3c10da79e315ecb0ff156995a998a1dc03463d9bb06a856844484a6d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31706791-E789-11EE-B991-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000ca82d4680be4b6009dc215713b210c6189acff1be8d910a564a1df8105548f75000000000e8000000002000020000000556c067999f8b0a0ad393bf1a9003d5131ecdac9637e1e4afd5c29f5256caa51900000002788217e5a36a653b8ff148d9eb41b4906a2304c0eab55d07f75f5a49c3d2a48e112e8d68dddef86abe72b7d7c42aa29d7ea87419fa6fe780c3d299ab14fcf012166483d98da0cef9b56020d36cb1111556ac28d1764cdb84fe4f04987529e1d49bd290fdcf3fe319069d33626e4586cb4ac01c1718aabb7c005485137fa16fcdccab689db0f62f8f404f53ed08013b340000000521f4d9d60fddf34260bd6abeb4eeec4c85f1b71d586abd36a257c0af4e5fbc2dcd80dd9a36d465e57b6ec05d49317385fc2702687ab2ca713e8c447dfe2bf76 iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03a0906967bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEnotepad.exesplwow64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" splwow64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU splwow64.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg splwow64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_TopViewVersion = "0" splwow64.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders splwow64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 splwow64.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 notepad.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff splwow64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" splwow64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 splwow64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 splwow64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 01000000030000000200000000000000ffffffff splwow64.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEWINWORD.EXEpid process 2564 WINWORD.EXE 1008 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exesvchost.exechrome.exepid process 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 2468 svchost.exe 568 chrome.exe 568 chrome.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exepid process 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe Token: SeShutdownPrivilege 568 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
Processes:
iexplore.exechrome.exepid process 1560 iexplore.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe 568 chrome.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
Processes:
iexplore.exeIEXPLORE.EXEWINWORD.EXEWINWORD.EXEsplwow64.exenotepad.exepid process 1560 iexplore.exe 1560 iexplore.exe 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 2564 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1552 splwow64.exe 592 IEXPLORE.EXE 592 IEXPLORE.EXE 2460 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exesvchost.exeiexplore.exechrome.exedescription pid process target process PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2452 wrote to memory of 2608 2452 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2608 wrote to memory of 2468 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe svchost.exe PID 2608 wrote to memory of 2468 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe svchost.exe PID 2608 wrote to memory of 2468 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe svchost.exe PID 2608 wrote to memory of 2468 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe svchost.exe PID 2608 wrote to memory of 2468 2608 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe svchost.exe PID 2468 wrote to memory of 2452 2468 svchost.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2468 wrote to memory of 2452 2468 svchost.exe 42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe PID 2468 wrote to memory of 2424 2468 svchost.exe notepad.exe PID 2468 wrote to memory of 2424 2468 svchost.exe notepad.exe PID 2468 wrote to memory of 2424 2468 svchost.exe notepad.exe PID 2468 wrote to memory of 2424 2468 svchost.exe notepad.exe PID 2468 wrote to memory of 2424 2468 svchost.exe notepad.exe PID 2468 wrote to memory of 2424 2468 svchost.exe notepad.exe PID 1560 wrote to memory of 592 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 592 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 592 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 592 1560 iexplore.exe IEXPLORE.EXE PID 568 wrote to memory of 1848 568 chrome.exe chrome.exe PID 568 wrote to memory of 1848 568 chrome.exe chrome.exe PID 568 wrote to memory of 1848 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe PID 568 wrote to memory of 2744 568 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe"C:\Users\Admin\AppData\Local\Temp\42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe"C:\Users\Admin\AppData\Local\Temp\42fee21b-30a2-ac48-bbb9-c6eae04ce8ae.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ConvertFromUnregister.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\CompressConvertFrom.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5699758,0x7fef5699768,0x7fef56997782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1288 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2268 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3696 --field-trial-handle=1212,i,15568287363046368979,11797236361528888017,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\CompressConvertFrom.doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
-
C:\Windows\system32\notepad.exenotepad2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\{6443B1B9-204F-1D74-6FB0-8B6621E198D2}\c9fc6126.exeFilesize
261KB
MD5e381028b496c601a9e0024d3a10b8d0e
SHA1bc28c3e44f65bec3e9fc0e3112027a9ade6969c6
SHA256382e891853d6e7cc04ad6c569b64b2d6ef09d2b07740e15282708b322c3a2a6c
SHA5127c90bcd7a136288e9ecd819e87a857009ca5802e0a0e9aff034cdb1ea7c23688dbc0ed074fa2e9dc7cf9ddabc9bc3fdd935e97e08665cdaf3bc0695d919fbe3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55acd79c368f49aa192ba64d559c65430
SHA1d53c4ab125cdec56beba714b50d71a0626ba06af
SHA25629344d77b509d736a070345bb7289dd5d895f60279bf3722d2dab45226ff7729
SHA512d2a80cb63c4e2369035c434ca1f61c5ef4385a968264e0dea925a6e8df32facbe36cdd36d9f8de957293ffbcc46f820d204f6f791346ee8238d011bfac2a2cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58acf4119087efad6e3ccbe9a0ee7b19a
SHA104d9956bee914049dbb044912f686f0cb3358ee6
SHA2567938adf365260409fc4e362b80431dbc989a7c18936aaacc2cf0ce583d3b76e5
SHA512296984fbee52b11b806edc5dee3f6811367c6801be8ff085a325d5efc0156b0e9447bc907dd301d8e8c874298f7416a8c6d1cd05fb954a33f582c344c1bbd3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55a724e98d508e62872d6c95b2e7c1472
SHA10fce96d8a621625aeff055fad3e6cc88ad7b8617
SHA25672c0915873379a1bccdfc7f6b34ff76f1ee90adaea4ee58c317ab309f5223d0e
SHA5126bbc64513a21f2a7fc743fbd26ade7e7a6bd594adea1dfdf5ff8a1aff9c62ef72761d0cd1d2e8f6a8659c33bea385d176982d9a7b7b030c531193dfd6ad01f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ede791fd7818a92bbddab9d0cbd045b1
SHA1fb35526ba48bee02c4fc9db812e8eb0df7c5bd39
SHA256d3ae23553151b0e1d67ab17e50d4e1e2d72ac6452546ae7e964fd2c903391c18
SHA51290103c768881692d1f15800cb3de1440e0dc4e361e46fe7b1869e461c9da49de300031e060d30600fffaa80fe5d54dce6f5d8c1986e2941b39f732e716ead5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d88e51270a856e5ccb58bd181dd67e8f
SHA1f733f5d81cf98755dc987d9d09edae81d9a4271e
SHA25620f5b73200f62d51e0f816061940d2c2b4906a213176d629b473c47ec2028918
SHA512cb82db7f84155d9e29fdd56087e3dc78bc230e30052ee357042e62b8f8099e708707188792b5a49a5e20dc4b3ce821ab4c02ab836a573058d09f1b562c32c085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d33420e71d8d73f2c778370969dc5021
SHA142cceb2b8b9a4581b43509058f4c7c606701abb9
SHA2561c8976f498c0db215b0208eed79c6d46fe42bf4bed257e0e94ab7808c9d69bb5
SHA512bd1327d3424e4f9c743e2b1d1422977a55d66e5ffe8d54522f0a337894c52baa02c839521f0854e76b1eb00201477c307b6139e9fdf503c1837cc9a6dfaca457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cafa6f22924611e2c57cf130a627d377
SHA1ece991b4844a67227944c041696ca6f0fd77718d
SHA256780a3a3574bf743bb077d152fff500de890562953e8fcc876a9882327193ab7b
SHA5120e35d4c7fef9134584356d3ef7965c9d6a92f6f834288b498e6e5f106fa4faab45d74ef1b51beaa5084d1230239ff2b7143559f758a6ee0498edb487a3397328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bccaf4ecc0ec79006a29069548908567
SHA1db0a8f77703607f9890985c1fc3356853f3a0ba0
SHA25687fb5461f6c3976c35c596c1de3fad14318e9946e366eb3277ac1df07f4fd0c5
SHA5126c89c9cf57e57c871ac77b8eb1f403a46ccd22a394b15297598fca297df3e7f964fc976b7a844f72dc1baeee89010b57054abd1b1e2e5ad4f9b8864795664fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d7c1eb7b5e0567a58404487a4de546ef
SHA1c6a7c473fb342195c104f5e499d95b1ded6cbed3
SHA2563e8885311aa96967c2aa6eb30bd448926ec9154076dd6af2cdc9547c620636a1
SHA51237e7ee8d8297c42305be08bbe528b7cc1da7fe866d19ab1bbe74edc54b4e3ad8ca8a6b6254e42ca78d4ff515e9640a3d9466c2b91462e3ad8740f5736a655ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52bb50d68ef9ce9e9fb76eb5930fdaaa0
SHA1cc4c1913ea8bb6d723ffaa498d544b24faaf3600
SHA256891f9a60366407e32381ed9ff06acf94a6dea9a9ed5ebba7d600cff425f8104f
SHA512a44387963180d538597f1ee01e946ede4c90bcac58856bdec90a72e6aaa4a1941e1c4df0fa503a66de32171f2bc99c0c26c51a14e09030051f0e44a4e3912dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53ff7092f7f5c6566a2bd273250c4ed38
SHA19007ea14f09adaf5f087b8722342c79c89079109
SHA2561ccd275a37d35e7512a8a21eca3aa65f43007f82a73531a9df4e90ba20ead2e3
SHA512fa08fe6d9c59d6dc27644db103f09a1c05e56f1c32a0872047bd8f0c32a48b1cf5419ecab28cf65e5caf4372f6c3fd3ff5dd285b5720b669fddab988ad3ba0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58a23b2d82848b8c6be2ee0f0b47d50ef
SHA109c10b8bfc31db4f5d1b47ae7dd68b75677d5e2e
SHA256eaba67ec6c0ae11a00b36cce306443f2c7636f4645b8682be14a92768ff5f0ef
SHA512b340cb9534b9f628037951baa88e49c45065371ccb608047940dca0b7ed30a785167ee9cf2ee9a2716a364e97c2a6d611604c5074630500dc85056ec99a27d9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmpFilesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
363B
MD5e44712759b5d47b437d4fc62c9716e97
SHA148f2589989611cbaf4994947c858f5a7f8d5d24b
SHA256535b638adef3232aab3d9281e828f9b673b223e0378409c634f95c497c599ca6
SHA512fea17df59ebf07aa0d2239540fe99939805b1aeca33d2dcbb7ab1d9d0ae4c36a5fc1479edc7ff9b0df7fad1ebc5eeb23fa515f75efafd3ddc7936ffd3f5dde91
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5dcef6e29da47ec57f4b0e95247161c73
SHA1efb485762d920896bb1ce8308ec7d43f0516edc0
SHA2563083d5a45f1a6e70e64a6a457abbe5f6cb7d03dae58a493ddc0867109a5e7d40
SHA512853551c5722b89351458319e00045133c2ca80bf8cfb44cae6f5badc79e69f67f07abf4e5e4898a045d901fdf0a691f620120a57072322b7491602a8ec5373d9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmpFilesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
259KB
MD55432937cd326631caea52e36c8d7d574
SHA1c79880c40d7af88d85c657b8dcaf94f82a30241d
SHA256c02dbe085cb9055339e98ab3496cc180ad056199a2338f55a97c2b45f07fb847
SHA5121d188088cfeb93e4c57c44b0e2d3c1a8e940db65abb5ae5a6bb5a38e617873ba61568204f90035a195acce84a70c7a174c38ec9ea24b4f76ba7a20f1b3d52564
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\cd0d2a85-ff3b-4aeb-9f88-acdc8e84691d.tmpFilesize
259KB
MD5b772a6552c7d0a47dd94adff42d0629c
SHA152763b41af6ddc42030f99a12b2e1a72919325c0
SHA2564130976c62ccca1a714d9a75f226c8d0bafc69ba65b5ae959471ef9af31bf77b
SHA512ccc8b56c8ad147cee41600302b6efab8f80ca3a158543e41f61d59d601cd234a14ff43cd96d8f6a1ed79e35bfc5c4b3dc27f04886b82892ea39050a01b568481
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0000.docFilesize
1.2MB
MD502af98ed35bdefe30ca743b8c96bef74
SHA1d1e789c549e57964e28bdcfc2430493a3db1653a
SHA2568d24b88e20d1dab4087aed2974668af2f406360f30f722964fa303f26761e2f5
SHA51259fb7fbb0b89540ba776de87837d93d9541ceef205daf0dfe7842785a6ff6df79badda3c2d911660ad718d781432fc1df04a704087baa7eafd57730015d5a1f1
-
C:\Users\Admin\AppData\Local\Temp\Cab4EAF.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar500E.tmpFilesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\CompressConvertFrom.doc.LNKFilesize
1KB
MD543189c97da3531a56eef527757842d54
SHA196242b0ca6fd8fb88233a5f91a69e29494716e8b
SHA256e1b0ac071664bcc401748d2e47883083ac2bf15ee5f3061572c615039e22cc48
SHA51272c7daa39c4a0ea799c859f707d18cddd620d251f76f808b4c5a275257c379fd0cfa15cdd4d66f99f4147bd43798ee1928202a1cefafa4b0b7535aff925ef67b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datFilesize
132B
MD5382f1f56e3bea97d98418dff3f5cc58b
SHA19cb747e23662d48e8fcb5067c7c4eaa387f17d0c
SHA2569856f3cdfe8b95239587f8287a29fce66b9df54ca5b66c171f711cff5038dc76
SHA512b027201d9c6c95fbcd5d9d7bd721af6dc6879b775aedc041a557a552625f9fc36b8e0f57a787d2a64519459c67f789423d13f9c4f4fd07a91982c9728396c1cd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datFilesize
132B
MD52a5d8d289aecf4104298bb7652570942
SHA1eef2ac1195428835e7a9f6eba705a5ab8ed583b0
SHA2566ab7227426d11d25481864a4295f675cfa8d2b1b60049896d89db633217dc233
SHA512c712f545c1dd16c7a28657794f6cd0ba6567e6980213fa7fc4fb6c50ad911a188a1059d1f071438096641cce42e5f7e82ddc37ba739cf6d6a692f93b2f6abc6b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datFilesize
80B
MD5fb731fd9f751d9728e0d3a4ccc02cbd9
SHA1e8f0bc1454434cbcbbe1937f2638c4570fc36576
SHA256b841ceea563ec651d3d08cf503ebecca210b32baec490de2a8bc93c2b834d824
SHA512fa92853ad2f727f626fb6f574db2d3cb1b78126d577f1b8c1088a1f7f3ba586a3738ab6fb0a088c176a32102eaf79aa6a297ebbdc55f2c538e206555feb7135d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotmFilesize
20KB
MD5261ccbde3cdd4feb98d66c3462dd10bf
SHA1d3042c68342996e694358b05c623f793e36893d6
SHA2562d75f466abc2250275ae9a9aa3e552451ddaf8d992c17491b6c6b09ad4e4803f
SHA5121d12f3ea45d091bfb0d0f5f3e5b0fff4b70439b65594d614cebce239d45aa6aaa02b3b8fa825c39bd0aa4aa9a5a71d3aefe4a271a94f43a441a1d3d360524898
-
C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DICFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\pipe\crashpad_568_GRWMAFLWZNIFPWLXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1008-1390-0x000000006EF9D000-0x000000006EFA8000-memory.dmpFilesize
44KB
-
memory/1008-1353-0x000000006EF9D000-0x000000006EFA8000-memory.dmpFilesize
44KB
-
memory/1008-1352-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1008-1351-0x000000002F141000-0x000000002F142000-memory.dmpFilesize
4KB
-
memory/1552-1386-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/1552-1387-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1552-1394-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/2424-33-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2452-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/2452-26-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/2460-1412-0x0000000003970000-0x0000000003971000-memory.dmpFilesize
4KB
-
memory/2468-17-0x0000000000080000-0x00000000000C2000-memory.dmpFilesize
264KB
-
memory/2468-19-0x00000000000D0000-0x00000000000FC000-memory.dmpFilesize
176KB
-
memory/2468-34-0x00000000000D0000-0x00000000000FC000-memory.dmpFilesize
176KB
-
memory/2468-23-0x00000000000D0000-0x00000000000FC000-memory.dmpFilesize
176KB
-
memory/2468-18-0x00000000000D0000-0x00000000000FC000-memory.dmpFilesize
176KB
-
memory/2468-22-0x00000000000D0000-0x00000000000FC000-memory.dmpFilesize
176KB
-
memory/2468-21-0x00000000000D0000-0x00000000000FC000-memory.dmpFilesize
176KB
-
memory/2468-20-0x00000000000D0000-0x00000000000FC000-memory.dmpFilesize
176KB
-
memory/2564-608-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2564-534-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2564-533-0x000000002F231000-0x000000002F232000-memory.dmpFilesize
4KB
-
memory/2564-535-0x000000006EFBD000-0x000000006EFC8000-memory.dmpFilesize
44KB
-
memory/2564-609-0x000000006EFBD000-0x000000006EFC8000-memory.dmpFilesize
44KB
-
memory/2608-9-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2608-7-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-16-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-5-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-3-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-1-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-24-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-13-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2608-15-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB