Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe
-
Size
73KB
-
MD5
2d57d5b3e5f2c05975e55437b817fece
-
SHA1
5180e06065681f3f3636c0eb22631147aaf03968
-
SHA256
8576a75c652dc9e6cd91c64aeeb3de8eedff58dea0ca89da19f36176314abfe4
-
SHA512
0a9439f4a28c00590f67f47344668ec5f3210f4a28a4cb9d88ee77e9c79e6025701752674c529e6aff44d1c3e478d795c8ddf2ad89892b8b2f001f06fb2f8d69
-
SSDEEP
1536:VW+0rI7A0w8J5eTUqN+I04zUD/8Jj2B0wOCnLDpCLk:X0rPuAAQ+Ie8JzwOCDpv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgapgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgscnr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avirarkmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgscnr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aswupsrc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgemkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgupsrvc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgapgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgupsrvc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashmailsrc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgupsrvc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsvam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgrdam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgscnr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmgent.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgemkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgemkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avirarkmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avirarkmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgapgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgemkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgapgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmsva.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashmailsrc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsvam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avirarkmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmsva.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgupsrvc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsvam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsvam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgemkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgemkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgscnr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgectam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsvam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avcntlx.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgemkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aswupsrc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdlp.exe -
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmsva.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avirarkmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation aswupsrc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashwbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashwbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsvam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgrdam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgscnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgectam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgapgui.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashwbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmsva.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgupsrvc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsvam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmgent.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgectam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avirarkmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmsva.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmgent.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgwsvcm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgrdam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgectam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgupsrvc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsdlp.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgscnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsdlp.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgemkdr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgrdam.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgemkdr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgemkdr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avcntlx.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgemkdr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmsva.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmsva.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsdlp.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avcntlx.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashwbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgmsva.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashwbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgwsvcm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avcntlx.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgemkdr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation aswupsrc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avcntlx.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgscnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgscnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgapgui.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgscnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsdlp.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avirarkmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgscnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashmailsrc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashwbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avirarkmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgemkdr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgwsvcm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsdlp.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashwbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation aswupsrc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgupsrvc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgscnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation aswupsrc.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation avgwsvcm.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ashsdlp.exe -
Executes dropped EXE 64 IoCs
pid Process 2492 avgmsva.exe 4052 avgmsva.exe 1364 avgmsva.exe 1164 avgmsva.exe 4156 avgmsva.exe 4512 avgmsva.exe 4932 ashsvam.exe 4728 ashsvam.exe 3944 ashwbsm.exe 1940 ashwbsm.exe 2224 ashwbsm.exe 4492 ashwbsm.exe 2464 avirarkmd.exe 2092 avirarkmd.exe 2360 ashsdlp.exe 2692 ashsdlp.exe 3780 avgmsva.exe 3316 avgmsva.exe 2136 avgemkdr.exe 4532 avgemkdr.exe 2052 avcntlx.exe 560 avcntlx.exe 4252 avgmsva.exe 4352 avgmsva.exe 1348 avgectam.exe 4268 avgectam.exe 4220 ashwbsm.exe 3288 ashwbsm.exe 2136 avgemkdr.exe 912 avgemkdr.exe 3604 ashmailsrc.exe 2016 ashmailsrc.exe 2152 avgupsrvc.exe 4288 avgupsrvc.exe 3732 avgrdam.exe 2776 avgrdam.exe 5108 avirarkmd.exe 920 avirarkmd.exe 4944 avgmsva.exe 2092 avgmsva.exe 3604 avgemkdr.exe 4524 avgemkdr.exe 4652 ashsdlp.exe 5004 ashsdlp.exe 4076 avgscnr.exe 1204 avgscnr.exe 1616 avgapgui.exe 3644 avgapgui.exe 1260 ashwbsm.exe 4552 ashwbsm.exe 640 avgrdam.exe 3136 avgrdam.exe 1536 aswupsrc.exe 4412 aswupsrc.exe 1344 avcntlx.exe 2648 avcntlx.exe 3596 avgmgent.exe 4464 avgmgent.exe 3252 ashwbsm.exe 316 ashwbsm.exe 2964 ashmailsrc.exe 4360 ashmailsrc.exe 1380 avgwsvcm.exe 2272 avgwsvcm.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Servicer = "ashsvam.exe" avgupsrvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast AutoBackup Client = "avgmsva.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir DB Management = "avgmgent.exe" avgmsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" avgwsvcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Controller = "avgectam.exe" ashwbsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast MailWatch Client = "ashmailsrc.exe" avgrdam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast WebWatch Client = "ashwbsm.exe" ashwbsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast AutoBackup Client = "avgmsva.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus GUI = "avgapgui.exe" avgscnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Rootkit Remover = "avirarkmd.exe" avgemkdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Active-Guard = "avgrdam.exe" ashwbsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast WebWatch Client = "ashwbsm.exe" avgapgui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Auto-Updater = "aswupsrc.exe" ashsvam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast WebWatch Client = "ashwbsm.exe" avcntlx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Security System = "avgwsvcm.exe" avirarkmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Rootkit Remover = "avirarkmd.exe" aswupsrc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir DB Management = "avgmgent.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Control = "avcntlx.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Servicer = "ashsvam.exe" avgectam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Scanner = "avgscnr.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast AutoBackup Client = "avgmsva.exe" avgmsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast AutoBackup Client = "avgmsva.exe" avcntlx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Display Service = "ashsdlp.exe" avgemkdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast WebWatch Client = "ashwbsm.exe" avgmgent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast AutoBackup Client = "avgmsva.exe" 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast WebWatch Client = "ashwbsm.exe" ashsvam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Servicer = "avgupsrvc.exe" avgmgent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Scanner = "avgscnr.exe" avgmgent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Rootkit Remover = "avirarkmd.exe" ashwbsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" avgmsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast WebWatch Client = "ashwbsm.exe" avgapgui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast WebWatch Client = "ashwbsm.exe" avirarkmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Servicer = "ashsvam.exe" avgrdam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Display Service = "ashsdlp.exe" avirarkmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Display Service = "ashsdlp.exe" avgwsvcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Scanner = "avgscnr.exe" avcntlx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Control = "avcntlx.exe" avgscnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast AutoBackup Client = "avgmsva.exe" avgmsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Display Service = "ashsdlp.exe" avgectam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Servicer = "avgupsrvc.exe" avgmgent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Servicer = "avgupsrvc.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" ashwbsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" avcntlx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus GUI = "avgapgui.exe" avgmgent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Rootkit Remover = "avirarkmd.exe" avgemkdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Auto-Updater = "aswupsrc.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Scanner = "avgscnr.exe" ashsvam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Control = "avcntlx.exe" avgscnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Servicer = "ashsvam.exe" avgwsvcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" avgmsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus Scanner = "avgscnr.exe" ashsdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" avgmsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir DB Management = "avgmgent.exe" avcntlx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir DB Management = "avgmgent.exe" avgapgui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG AntiVirus GUI = "avgapgui.exe" avirarkmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir DB Management = "avgmgent.exe" avgemkdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast AutoBackup Client = "avgmsva.exe" avgemkdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Rootkit Remover = "avirarkmd.exe" avcntlx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" ashsvam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Rootkit Remover = "avirarkmd.exe" avgrdam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Auto-Updater = "aswupsrc.exe" avgrdam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast Management Service = "avgemkdr.exe" avgmsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AntiVir Control = "avcntlx.exe" avirarkmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Avast MailWatch Client = "ashmailsrc.exe" ashwbsm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ashsdlp.exe ashsdlp.exe File opened for modification C:\Windows\SysWOW64\ashmailsrc.exe avgrdam.exe File created C:\Windows\SysWOW64\avgmsva.exe 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\avgscnr.exe avgupsrvc.exe File created C:\Windows\SysWOW64\avgapgui.exe avgscnr.exe File opened for modification C:\Windows\SysWOW64\avgapgui.exe avgmsva.exe File opened for modification C:\Windows\SysWOW64\avgwsvcm.exe ashwbsm.exe File created C:\Windows\SysWOW64\avcntlx.exe ashsvam.exe File opened for modification C:\Windows\SysWOW64\avirarkmd.exe avcntlx.exe File opened for modification C:\Windows\SysWOW64\aswupsrc.exe ashsvam.exe File created C:\Windows\SysWOW64\avgrdam.exe ashwbsm.exe File opened for modification C:\Windows\SysWOW64\ashwbsm.exe avgmgent.exe File created C:\Windows\SysWOW64\ashsvam.exe avgupsrvc.exe File created C:\Windows\SysWOW64\avgapgui.exe avgscnr.exe File created C:\Windows\SysWOW64\avgscnr.exe ashwbsm.exe File opened for modification C:\Windows\SysWOW64\avgemkdr.exe aswupsrc.exe File opened for modification C:\Windows\SysWOW64\avgscnr.exe avgupsrvc.exe File created C:\Windows\SysWOW64\avgscnr.exe ashsdlp.exe File opened for modification C:\Windows\SysWOW64\aswupsrc.exe avgupsrvc.exe File created C:\Windows\SysWOW64\avgapgui.exe avgmsva.exe File created C:\Windows\SysWOW64\avcntlx.exe avgwsvcm.exe File opened for modification C:\Windows\SysWOW64\ashsvam.exe avgwsvcm.exe File opened for modification C:\Windows\SysWOW64\avgemkdr.exe avgmsva.exe File opened for modification C:\Windows\SysWOW64\avgectam.exe ashsdlp.exe File created C:\Windows\SysWOW64\avgmsva.exe avgmsva.exe File opened for modification C:\Windows\SysWOW64\avgwsvcm.exe avgscnr.exe File created C:\Windows\SysWOW64\ashwbsm.exe avgmgent.exe File opened for modification C:\Windows\SysWOW64\avcntlx.exe avgscnr.exe File opened for modification C:\Windows\SysWOW64\avgscnr.exe ashsdlp.exe File opened for modification C:\Windows\SysWOW64\ashsdlp.exe avgapgui.exe File created C:\Windows\SysWOW64\avgectam.exe avgmsva.exe File opened for modification C:\Windows\SysWOW64\avgectam.exe avgmsva.exe File opened for modification C:\Windows\SysWOW64\avgmgent.exe avgmsva.exe File created C:\Windows\SysWOW64\avgscnr.exe avgmgent.exe File created C:\Windows\SysWOW64\avgapgui.exe avirarkmd.exe File created C:\Windows\SysWOW64\avgmgent.exe avcntlx.exe File created C:\Windows\SysWOW64\avgmsva.exe avcntlx.exe File opened for modification C:\Windows\SysWOW64\aswupsrc.exe avgrdam.exe File created C:\Windows\SysWOW64\avgupsrvc.exe ashsdlp.exe File opened for modification C:\Windows\SysWOW64\avgmsva.exe ashsdlp.exe File created C:\Windows\SysWOW64\ashsvam.exe avgwsvcm.exe File created C:\Windows\SysWOW64\avgrdam.exe avgemkdr.exe File opened for modification C:\Windows\SysWOW64\ashwbsm.exe ashwbsm.exe File created C:\Windows\SysWOW64\avgectam.exe avgemkdr.exe File opened for modification C:\Windows\SysWOW64\aswupsrc.exe avgemkdr.exe File opened for modification C:\Windows\SysWOW64\avgwsvcm.exe avirarkmd.exe File opened for modification C:\Windows\SysWOW64\avirarkmd.exe avgrdam.exe File created C:\Windows\SysWOW64\aswupsrc.exe avgemkdr.exe File created C:\Windows\SysWOW64\avcntlx.exe aswupsrc.exe File created C:\Windows\SysWOW64\avgscnr.exe ashsvam.exe File opened for modification C:\Windows\SysWOW64\avcntlx.exe ashsdlp.exe File opened for modification C:\Windows\SysWOW64\avgrdam.exe avgemkdr.exe File created C:\Windows\SysWOW64\ashsvam.exe avgrdam.exe File opened for modification C:\Windows\SysWOW64\ashsvam.exe avgupsrvc.exe File opened for modification C:\Windows\SysWOW64\ashsdlp.exe avgwsvcm.exe File created C:\Windows\SysWOW64\avcntlx.exe ashsdlp.exe File created C:\Windows\SysWOW64\ashwbsm.exe ashwbsm.exe File created C:\Windows\SysWOW64\avgemkdr.exe avgapgui.exe File created C:\Windows\SysWOW64\aswupsrc.exe ashsvam.exe File opened for modification C:\Windows\SysWOW64\avirarkmd.exe avgectam.exe File created C:\Windows\SysWOW64\avgemkdr.exe avgwsvcm.exe File opened for modification C:\Windows\SysWOW64\ashsdlp.exe avgectam.exe File opened for modification C:\Windows\SysWOW64\avgupsrvc.exe ashmailsrc.exe File created C:\Windows\SysWOW64\avgscnr.exe avgupsrvc.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2376 set thread context of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2492 set thread context of 4052 2492 avgmsva.exe 95 PID 1364 set thread context of 1164 1364 avgmsva.exe 105 PID 4156 set thread context of 4512 4156 avgmsva.exe 115 PID 4932 set thread context of 4728 4932 ashsvam.exe 125 PID 3944 set thread context of 1940 3944 ashwbsm.exe 135 PID 2224 set thread context of 4492 2224 ashwbsm.exe 145 PID 2464 set thread context of 2092 2464 avirarkmd.exe 155 PID 2360 set thread context of 2692 2360 ashsdlp.exe 165 PID 3780 set thread context of 3316 3780 avgmsva.exe 175 PID 2136 set thread context of 4532 2136 avgemkdr.exe 185 PID 2052 set thread context of 560 2052 avcntlx.exe 195 PID 4252 set thread context of 4352 4252 avgmsva.exe 205 PID 1348 set thread context of 4268 1348 avgectam.exe 215 PID 4220 set thread context of 3288 4220 ashwbsm.exe 225 PID 2136 set thread context of 912 2136 avgemkdr.exe 235 PID 3604 set thread context of 2016 3604 ashmailsrc.exe 245 PID 2152 set thread context of 4288 2152 avgupsrvc.exe 255 PID 3732 set thread context of 2776 3732 avgrdam.exe 265 PID 5108 set thread context of 920 5108 avirarkmd.exe 275 PID 4944 set thread context of 2092 4944 avgmsva.exe 285 PID 3604 set thread context of 4524 3604 avgemkdr.exe 295 PID 4652 set thread context of 5004 4652 ashsdlp.exe 305 PID 4076 set thread context of 1204 4076 avgscnr.exe 315 PID 1616 set thread context of 3644 1616 avgapgui.exe 326 PID 1260 set thread context of 4552 1260 ashwbsm.exe 337 PID 640 set thread context of 3136 640 avgrdam.exe 347 PID 1344 set thread context of 2648 1344 avcntlx.exe 367 PID 3596 set thread context of 4464 3596 avgmgent.exe 377 PID 3252 set thread context of 316 3252 ashwbsm.exe 387 PID 2964 set thread context of 4360 2964 ashmailsrc.exe 397 PID 1380 set thread context of 2272 1380 avgwsvcm.exe 407 PID 3692 set thread context of 4252 3692 ashsdlp.exe 417 PID 5104 set thread context of 2332 5104 avgmgent.exe 428 PID 3992 set thread context of 2208 3992 avgapgui.exe 438 PID 3756 set thread context of 2820 3756 avgmgent.exe 448 PID 3248 set thread context of 5108 3248 avgupsrvc.exe 458 PID 3900 set thread context of 872 3900 avgscnr.exe 468 PID 4416 set thread context of 1592 4416 ashsdlp.exe 478 PID 1868 set thread context of 324 1868 avcntlx.exe 488 PID 1932 set thread context of 3208 1932 avgscnr.exe 498 PID 2380 set thread context of 2936 2380 avgapgui.exe 508 PID 1064 set thread context of 1872 1064 ashwbsm.exe 518 PID 384 set thread context of 1228 384 avgemkdr.exe 528 PID 1704 set thread context of 5008 1704 avirarkmd.exe 538 PID 460 set thread context of 4284 460 avgapgui.exe 548 PID 4664 set thread context of 1116 4664 avgemkdr.exe 558 PID 884 set thread context of 1860 884 avgectam.exe 568 PID 2448 set thread context of 5108 2448 ashsvam.exe 578 PID 2052 set thread context of 3968 2052 ashsdlp.exe 588 PID 408 set thread context of 1772 408 aswupsrc.exe 598 PID 2152 set thread context of 4704 2152 ashsdlp.exe 608 PID 3236 set thread context of 1116 3236 avgscnr.exe 618 PID 3212 set thread context of 4852 3212 avgemkdr.exe 628 PID 700 set thread context of 3368 700 ashsdlp.exe 638 PID 5108 set thread context of 2520 5108 avgectam.exe 648 PID 4484 set thread context of 3980 4484 ashsdlp.exe 658 PID 2744 set thread context of 1104 2744 avgmsva.exe 668 PID 832 set thread context of 4588 832 avgapgui.exe 678 PID 1984 set thread context of 4940 1984 avgemkdr.exe 688 PID 4564 set thread context of 4396 4564 avgwsvcm.exe 698 PID 1596 set thread context of 1384 1596 avcntlx.exe 708 PID 3640 set thread context of 3712 3640 ashwbsm.exe 718 PID 460 set thread context of 2860 460 avgwsvcm.exe 728 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avcntlx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashwbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgapgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgapgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avirarkmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avcntlx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashwbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgectam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgwsvcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsvam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgupsrvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgapgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashwbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgrdam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ aswupsrc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgmsva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avcntlx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashmailsrc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgwsvcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgmgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgmsva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgupsrvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgmsva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avirarkmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsvam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgscnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ aswupsrc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgmsva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashwbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgmgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashwbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgmsva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgrdam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgwsvcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgapgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgapgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avgemkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsvam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashwbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ashsdlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ avirarkmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4052 avgmsva.exe Token: SeIncBasePriorityPrivilege 1164 avgmsva.exe Token: SeIncBasePriorityPrivilege 4512 avgmsva.exe Token: SeIncBasePriorityPrivilege 4728 ashsvam.exe Token: SeIncBasePriorityPrivilege 1940 ashwbsm.exe Token: SeIncBasePriorityPrivilege 4492 ashwbsm.exe Token: SeIncBasePriorityPrivilege 2092 avirarkmd.exe Token: SeIncBasePriorityPrivilege 2692 ashsdlp.exe Token: SeIncBasePriorityPrivilege 3316 avgmsva.exe Token: SeIncBasePriorityPrivilege 4532 avgemkdr.exe Token: SeIncBasePriorityPrivilege 560 avcntlx.exe Token: SeIncBasePriorityPrivilege 4352 avgmsva.exe Token: SeIncBasePriorityPrivilege 4268 avgectam.exe Token: SeIncBasePriorityPrivilege 3288 ashwbsm.exe Token: SeIncBasePriorityPrivilege 912 avgemkdr.exe Token: SeIncBasePriorityPrivilege 2016 ashmailsrc.exe Token: SeIncBasePriorityPrivilege 4288 avgupsrvc.exe Token: SeIncBasePriorityPrivilege 2776 avgrdam.exe Token: SeIncBasePriorityPrivilege 920 avirarkmd.exe Token: SeIncBasePriorityPrivilege 2092 avgmsva.exe Token: SeIncBasePriorityPrivilege 4524 avgemkdr.exe Token: SeIncBasePriorityPrivilege 5004 ashsdlp.exe Token: SeIncBasePriorityPrivilege 1204 avgscnr.exe Token: SeIncBasePriorityPrivilege 3644 avgapgui.exe Token: SeIncBasePriorityPrivilege 4552 ashwbsm.exe Token: SeIncBasePriorityPrivilege 3136 avgrdam.exe Token: SeIncBasePriorityPrivilege 4412 aswupsrc.exe Token: SeIncBasePriorityPrivilege 2648 avcntlx.exe Token: SeIncBasePriorityPrivilege 4464 avgmgent.exe Token: SeIncBasePriorityPrivilege 316 ashwbsm.exe Token: SeIncBasePriorityPrivilege 4360 ashmailsrc.exe Token: SeIncBasePriorityPrivilege 2272 avgwsvcm.exe Token: SeIncBasePriorityPrivilege 4252 ashsdlp.exe Token: SeIncBasePriorityPrivilege 2332 avgmgent.exe Token: SeIncBasePriorityPrivilege 2208 avgapgui.exe Token: SeIncBasePriorityPrivilege 2820 avgmgent.exe Token: SeIncBasePriorityPrivilege 5108 avgupsrvc.exe Token: SeIncBasePriorityPrivilege 872 avgscnr.exe Token: SeIncBasePriorityPrivilege 1592 ashsdlp.exe Token: SeIncBasePriorityPrivilege 324 avcntlx.exe Token: SeIncBasePriorityPrivilege 3208 avgscnr.exe Token: SeIncBasePriorityPrivilege 2936 avgapgui.exe Token: SeIncBasePriorityPrivilege 1872 ashwbsm.exe Token: SeIncBasePriorityPrivilege 1228 avgemkdr.exe Token: SeIncBasePriorityPrivilege 5008 avirarkmd.exe Token: SeIncBasePriorityPrivilege 4284 avgapgui.exe Token: SeIncBasePriorityPrivilege 1116 avgemkdr.exe Token: SeIncBasePriorityPrivilege 1860 avgectam.exe Token: SeIncBasePriorityPrivilege 5108 ashsvam.exe Token: SeIncBasePriorityPrivilege 3968 ashsdlp.exe Token: SeIncBasePriorityPrivilege 1772 aswupsrc.exe Token: SeIncBasePriorityPrivilege 4704 ashsdlp.exe Token: SeIncBasePriorityPrivilege 1116 avgscnr.exe Token: SeIncBasePriorityPrivilege 4852 avgemkdr.exe Token: SeIncBasePriorityPrivilege 3368 ashsdlp.exe Token: SeIncBasePriorityPrivilege 2520 avgectam.exe Token: SeIncBasePriorityPrivilege 3980 ashsdlp.exe Token: SeIncBasePriorityPrivilege 1104 avgmsva.exe Token: SeIncBasePriorityPrivilege 4588 avgapgui.exe Token: SeIncBasePriorityPrivilege 4940 avgemkdr.exe Token: SeIncBasePriorityPrivilege 4396 avgwsvcm.exe Token: SeIncBasePriorityPrivilege 1384 avcntlx.exe Token: SeIncBasePriorityPrivilege 3712 ashwbsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 2376 wrote to memory of 1300 2376 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 85 PID 1300 wrote to memory of 2492 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 86 PID 1300 wrote to memory of 2492 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 86 PID 1300 wrote to memory of 2492 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 86 PID 1300 wrote to memory of 2696 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 87 PID 1300 wrote to memory of 2696 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 87 PID 1300 wrote to memory of 2696 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 87 PID 1300 wrote to memory of 3944 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 88 PID 1300 wrote to memory of 3944 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 88 PID 1300 wrote to memory of 3944 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 88 PID 1300 wrote to memory of 1484 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 89 PID 1300 wrote to memory of 1484 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 89 PID 1300 wrote to memory of 1484 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 89 PID 1300 wrote to memory of 4856 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 91 PID 1300 wrote to memory of 4856 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 91 PID 1300 wrote to memory of 4856 1300 2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe 91 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 2492 wrote to memory of 4052 2492 avgmsva.exe 95 PID 4052 wrote to memory of 1364 4052 avgmsva.exe 96 PID 4052 wrote to memory of 1364 4052 avgmsva.exe 96 PID 4052 wrote to memory of 1364 4052 avgmsva.exe 96 PID 4052 wrote to memory of 4756 4052 avgmsva.exe 97 PID 4052 wrote to memory of 4756 4052 avgmsva.exe 97 PID 4052 wrote to memory of 4756 4052 avgmsva.exe 97 PID 4052 wrote to memory of 1932 4052 avgmsva.exe 98 PID 4052 wrote to memory of 1932 4052 avgmsva.exe 98 PID 4052 wrote to memory of 1932 4052 avgmsva.exe 98 PID 4052 wrote to memory of 5104 4052 avgmsva.exe 99 PID 4052 wrote to memory of 5104 4052 avgmsva.exe 99 PID 4052 wrote to memory of 5104 4052 avgmsva.exe 99 PID 4052 wrote to memory of 4664 4052 avgmsva.exe 100 PID 4052 wrote to memory of 4664 4052 avgmsva.exe 100 PID 4052 wrote to memory of 4664 4052 avgmsva.exe 100 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1364 wrote to memory of 1164 1364 avgmsva.exe 105 PID 1164 wrote to memory of 4156 1164 avgmsva.exe 106 PID 1164 wrote to memory of 4156 1164 avgmsva.exe 106 PID 1164 wrote to memory of 4156 1164 avgmsva.exe 106 PID 1164 wrote to memory of 4176 1164 avgmsva.exe 107 PID 1164 wrote to memory of 4176 1164 avgmsva.exe 107 PID 1164 wrote to memory of 4176 1164 avgmsva.exe 107 PID 1164 wrote to memory of 2380 1164 avgmsva.exe 108 PID 1164 wrote to memory of 2380 1164 avgmsva.exe 108 PID 1164 wrote to memory of 2380 1164 avgmsva.exe 108 PID 1164 wrote to memory of 1552 1164 avgmsva.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d57d5b3e5f2c05975e55437b817fece_JaffaCakes118.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\system32\avgmsva.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\SysWOW64\avgmsva.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\system32\avgmsva.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\SysWOW64\avgmsva.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\system32\avgmsva.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4156 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\SysWOW64\avgmsva.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4512 -
C:\Windows\SysWOW64\ashsvam.exe"C:\Windows\system32\ashsvam.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4932 -
C:\Windows\SysWOW64\ashsvam.exe"C:\Windows\SysWOW64\ashsvam.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4728 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\system32\ashwbsm.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3944 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\SysWOW64\ashwbsm.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\system32\ashwbsm.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2224 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\SysWOW64\ashwbsm.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\avirarkmd.exe"C:\Windows\system32\avirarkmd.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2464 -
C:\Windows\SysWOW64\avirarkmd.exe"C:\Windows\SysWOW64\avirarkmd.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2360 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\system32\avgmsva.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3780 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\SysWOW64\avgmsva.exe"20⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3316 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\system32\avgemkdr.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2136 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\SysWOW64\avgemkdr.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\Windows\SysWOW64\avcntlx.exe"C:\Windows\system32\avcntlx.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2052 -
C:\Windows\SysWOW64\avcntlx.exe"C:\Windows\SysWOW64\avcntlx.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:560 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\system32\avgmsva.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4252 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\SysWOW64\avgmsva.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4352 -
C:\Windows\SysWOW64\avgectam.exe"C:\Windows\system32\avgectam.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1348 -
C:\Windows\SysWOW64\avgectam.exe"C:\Windows\SysWOW64\avgectam.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4268 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\system32\ashwbsm.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4220 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\SysWOW64\ashwbsm.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3288 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\system32\avgemkdr.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2136 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\SysWOW64\avgemkdr.exe"32⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:912 -
C:\Windows\SysWOW64\ashmailsrc.exe"C:\Windows\system32\ashmailsrc.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3604 -
C:\Windows\SysWOW64\ashmailsrc.exe"C:\Windows\SysWOW64\ashmailsrc.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\avgupsrvc.exe"C:\Windows\system32\avgupsrvc.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2152 -
C:\Windows\SysWOW64\avgupsrvc.exe"C:\Windows\SysWOW64\avgupsrvc.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Windows\SysWOW64\avgrdam.exe"C:\Windows\system32\avgrdam.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3732 -
C:\Windows\SysWOW64\avgrdam.exe"C:\Windows\SysWOW64\avgrdam.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\avirarkmd.exe"C:\Windows\system32\avirarkmd.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5108 -
C:\Windows\SysWOW64\avirarkmd.exe"C:\Windows\SysWOW64\avirarkmd.exe"40⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\system32\avgmsva.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4944 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\SysWOW64\avgmsva.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\system32\avgemkdr.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3604 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\SysWOW64\avgemkdr.exe"44⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4652 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"46⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5004 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\system32\avgscnr.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4076 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\SysWOW64\avgscnr.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\system32\avgapgui.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1616 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\SysWOW64\avgapgui.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\system32\ashwbsm.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1260 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\SysWOW64\ashwbsm.exe"52⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4552 -
C:\Windows\SysWOW64\avgrdam.exe"C:\Windows\system32\avgrdam.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:640 -
C:\Windows\SysWOW64\avgrdam.exe"C:\Windows\SysWOW64\avgrdam.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\aswupsrc.exe"C:\Windows\system32\aswupsrc.exe"55⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\aswupsrc.exe"C:\Windows\SysWOW64\aswupsrc.exe"56⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\avcntlx.exe"C:\Windows\system32\avcntlx.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1344 -
C:\Windows\SysWOW64\avcntlx.exe"C:\Windows\SysWOW64\avcntlx.exe"58⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\avgmgent.exe"C:\Windows\system32\avgmgent.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3596 -
C:\Windows\SysWOW64\avgmgent.exe"C:\Windows\SysWOW64\avgmgent.exe"60⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\system32\ashwbsm.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3252 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\SysWOW64\ashwbsm.exe"62⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Windows\SysWOW64\ashmailsrc.exe"C:\Windows\system32\ashmailsrc.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2964 -
C:\Windows\SysWOW64\ashmailsrc.exe"C:\Windows\SysWOW64\ashmailsrc.exe"64⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Windows\SysWOW64\avgwsvcm.exe"C:\Windows\system32\avgwsvcm.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1380 -
C:\Windows\SysWOW64\avgwsvcm.exe"C:\Windows\SysWOW64\avgwsvcm.exe"66⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"67⤵
- Suspicious use of SetThreadContext
PID:3692 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"68⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4252 -
C:\Windows\SysWOW64\avgmgent.exe"C:\Windows\system32\avgmgent.exe"69⤵
- Suspicious use of SetThreadContext
PID:5104 -
C:\Windows\SysWOW64\avgmgent.exe"C:\Windows\SysWOW64\avgmgent.exe"70⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\system32\avgapgui.exe"71⤵
- Suspicious use of SetThreadContext
PID:3992 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\SysWOW64\avgapgui.exe"72⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2208 -
C:\Windows\SysWOW64\avgmgent.exe"C:\Windows\system32\avgmgent.exe"73⤵
- Suspicious use of SetThreadContext
PID:3756 -
C:\Windows\SysWOW64\avgmgent.exe"C:\Windows\SysWOW64\avgmgent.exe"74⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Windows\SysWOW64\avgupsrvc.exe"C:\Windows\system32\avgupsrvc.exe"75⤵
- Suspicious use of SetThreadContext
PID:3248 -
C:\Windows\SysWOW64\avgupsrvc.exe"C:\Windows\SysWOW64\avgupsrvc.exe"76⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\system32\avgscnr.exe"77⤵
- Suspicious use of SetThreadContext
PID:3900 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\SysWOW64\avgscnr.exe"78⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"79⤵
- Suspicious use of SetThreadContext
PID:4416 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"80⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\avcntlx.exe"C:\Windows\system32\avcntlx.exe"81⤵
- Suspicious use of SetThreadContext
PID:1868 -
C:\Windows\SysWOW64\avcntlx.exe"C:\Windows\SysWOW64\avcntlx.exe"82⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:324 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\system32\avgscnr.exe"83⤵
- Suspicious use of SetThreadContext
PID:1932 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\SysWOW64\avgscnr.exe"84⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3208 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\system32\avgapgui.exe"85⤵
- Suspicious use of SetThreadContext
PID:2380 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\SysWOW64\avgapgui.exe"86⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\system32\ashwbsm.exe"87⤵
- Suspicious use of SetThreadContext
PID:1064 -
C:\Windows\SysWOW64\ashwbsm.exe"C:\Windows\SysWOW64\ashwbsm.exe"88⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\system32\avgemkdr.exe"89⤵
- Suspicious use of SetThreadContext
PID:384 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\SysWOW64\avgemkdr.exe"90⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Windows\SysWOW64\avirarkmd.exe"C:\Windows\system32\avirarkmd.exe"91⤵
- Suspicious use of SetThreadContext
PID:1704 -
C:\Windows\SysWOW64\avirarkmd.exe"C:\Windows\SysWOW64\avirarkmd.exe"92⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\system32\avgapgui.exe"93⤵
- Suspicious use of SetThreadContext
PID:460 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\SysWOW64\avgapgui.exe"94⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\system32\avgemkdr.exe"95⤵
- Suspicious use of SetThreadContext
PID:4664 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\SysWOW64\avgemkdr.exe"96⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\avgectam.exe"C:\Windows\system32\avgectam.exe"97⤵
- Suspicious use of SetThreadContext
PID:884 -
C:\Windows\SysWOW64\avgectam.exe"C:\Windows\SysWOW64\avgectam.exe"98⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Windows\SysWOW64\ashsvam.exe"C:\Windows\system32\ashsvam.exe"99⤵
- Suspicious use of SetThreadContext
PID:2448 -
C:\Windows\SysWOW64\ashsvam.exe"C:\Windows\SysWOW64\ashsvam.exe"100⤵
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"101⤵
- Suspicious use of SetThreadContext
PID:2052 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"102⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3968 -
C:\Windows\SysWOW64\aswupsrc.exe"C:\Windows\system32\aswupsrc.exe"103⤵
- Suspicious use of SetThreadContext
PID:408 -
C:\Windows\SysWOW64\aswupsrc.exe"C:\Windows\SysWOW64\aswupsrc.exe"104⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"105⤵
- Suspicious use of SetThreadContext
PID:2152 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"106⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\system32\avgscnr.exe"107⤵
- Suspicious use of SetThreadContext
PID:3236 -
C:\Windows\SysWOW64\avgscnr.exe"C:\Windows\SysWOW64\avgscnr.exe"108⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\system32\avgemkdr.exe"109⤵
- Suspicious use of SetThreadContext
PID:3212 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\SysWOW64\avgemkdr.exe"110⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4852 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"111⤵
- Suspicious use of SetThreadContext
PID:700 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"112⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3368 -
C:\Windows\SysWOW64\avgectam.exe"C:\Windows\system32\avgectam.exe"113⤵
- Suspicious use of SetThreadContext
PID:5108 -
C:\Windows\SysWOW64\avgectam.exe"C:\Windows\SysWOW64\avgectam.exe"114⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\system32\ashsdlp.exe"115⤵
- Suspicious use of SetThreadContext
PID:4484 -
C:\Windows\SysWOW64\ashsdlp.exe"C:\Windows\SysWOW64\ashsdlp.exe"116⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\system32\avgmsva.exe"117⤵
- Suspicious use of SetThreadContext
PID:2744 -
C:\Windows\SysWOW64\avgmsva.exe"C:\Windows\SysWOW64\avgmsva.exe"118⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\system32\avgapgui.exe"119⤵
- Suspicious use of SetThreadContext
PID:832 -
C:\Windows\SysWOW64\avgapgui.exe"C:\Windows\SysWOW64\avgapgui.exe"120⤵
- Modifies visiblity of hidden/system files in Explorer
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\system32\avgemkdr.exe"121⤵
- Suspicious use of SetThreadContext
PID:1984 -
C:\Windows\SysWOW64\avgemkdr.exe"C:\Windows\SysWOW64\avgemkdr.exe"122⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-