Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe
-
Size
184KB
-
MD5
60a86330789a0643714d2c4ef9c7be5c
-
SHA1
6cf5eb75e9bb75c2f42bcb301f42f444c5fd595f
-
SHA256
423bbaf907eb2af786f3765585e8b09f9a8a6931191361ec1e25a7e8ed173fb4
-
SHA512
e9d36ad02b0fb7adfa42d78aedb1d899ddeaf0a27fd688b00572e0acc158ead5e71f91fe954c7aa25ded65dc77640ff5b7af28b2e607284dd7ba50f4389c4ee3
-
SSDEEP
1536:34VcdfuvL1VITgv3NOnouy8Vk+3or43OMvkvacjBy02WMm:3oAfKyg1OoutVk+Ys+MvkNjBqWMm
Malware Config
Extracted
xtremerat
schalfer.no-ip.org
33schalfer.no-ip.org
翿翿翿翿schalfer.no-ip.org
Signatures
-
Detect XtremeRAT payload 7 IoCs
resource yara_rule behavioral2/memory/2140-5-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/2140-4-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/1524-12-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/2140-16-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/752-21-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/752-22-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/752-30-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat -
Modifies WinLogon for persistence 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds policy Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe restart" RtlUmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{15L2M2S1-DO8F-T0KX-6P6J-RJ7Q744F3K35} RtlUmd.exe -
Checks computer location settings 2 TTPs 50 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RtlUmd.exe -
Executes dropped EXE 64 IoCs
pid Process 832 RtlUmd.exe 752 RtlUmd.exe 1812 RtlUmd.exe 3012 RtlUmd.exe 3984 RtlUmd.exe 3352 RtlUmd.exe 4512 RtlUmd.exe 5072 RtlUmd.exe 1064 RtlUmd.exe 2552 RtlUmd.exe 4936 RtlUmd.exe 4296 RtlUmd.exe 3212 RtlUmd.exe 1472 RtlUmd.exe 3640 RtlUmd.exe 2252 RtlUmd.exe 1540 RtlUmd.exe 3428 RtlUmd.exe 1892 RtlUmd.exe 4444 RtlUmd.exe 3608 RtlUmd.exe 5096 RtlUmd.exe 3736 RtlUmd.exe 432 RtlUmd.exe 516 RtlUmd.exe 4296 RtlUmd.exe 808 RtlUmd.exe 3976 RtlUmd.exe 3544 RtlUmd.exe 2452 RtlUmd.exe 2136 RtlUmd.exe 720 RtlUmd.exe 3676 RtlUmd.exe 1472 RtlUmd.exe 1112 RtlUmd.exe 4444 RtlUmd.exe 2228 RtlUmd.exe 3192 RtlUmd.exe 3976 RtlUmd.exe 2944 RtlUmd.exe 2832 RtlUmd.exe 1856 RtlUmd.exe 1288 RtlUmd.exe 1684 RtlUmd.exe 3076 RtlUmd.exe 5192 RtlUmd.exe 5320 RtlUmd.exe 5372 RtlUmd.exe 5468 RtlUmd.exe 5516 RtlUmd.exe 5592 RtlUmd.exe 5608 RtlUmd.exe 5708 RtlUmd.exe 5888 RtlUmd.exe 5896 RtlUmd.exe 6044 RtlUmd.exe 6116 RtlUmd.exe 5156 RtlUmd.exe 5204 RtlUmd.exe 5264 RtlUmd.exe 5308 RtlUmd.exe 5476 RtlUmd.exe 4444 RtlUmd.exe 5580 RtlUmd.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine RtlUmd.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RtlUmd = "C:\\Users\\Admin\\AppData\\Roaming\\Netwrk\\RtlUmd.exe" RtlUmd.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2412 set thread context of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 832 set thread context of 752 832 RtlUmd.exe 107 PID 1812 set thread context of 3984 1812 RtlUmd.exe 118 PID 3012 set thread context of 4512 3012 RtlUmd.exe 126 PID 3352 set thread context of 5072 3352 RtlUmd.exe 131 PID 1064 set thread context of 4936 1064 RtlUmd.exe 141 PID 2552 set thread context of 4296 2552 RtlUmd.exe 146 PID 3212 set thread context of 2252 3212 RtlUmd.exe 162 PID 1472 set thread context of 1540 1472 RtlUmd.exe 169 PID 3640 set thread context of 4444 3640 RtlUmd.exe 178 PID 3428 set thread context of 3608 3428 RtlUmd.exe 187 PID 1892 set thread context of 3736 1892 RtlUmd.exe 194 PID 5096 set thread context of 4296 5096 RtlUmd.exe 202 PID 432 set thread context of 808 432 RtlUmd.exe 213 PID 516 set thread context of 3976 516 RtlUmd.exe 216 PID 3544 set thread context of 720 3544 RtlUmd.exe 229 PID 2452 set thread context of 3676 2452 RtlUmd.exe 234 PID 1472 set thread context of 4444 1472 RtlUmd.exe 252 PID 1112 set thread context of 3192 1112 RtlUmd.exe 259 PID 2228 set thread context of 2944 2228 RtlUmd.exe 267 PID 3976 set thread context of 1856 3976 RtlUmd.exe 274 PID 2832 set thread context of 1684 2832 RtlUmd.exe 282 PID 1288 set thread context of 3076 1288 RtlUmd.exe 289 PID 5192 set thread context of 5372 5192 RtlUmd.exe 307 PID 5320 set thread context of 5516 5320 RtlUmd.exe 314 PID 5468 set thread context of 5708 5468 RtlUmd.exe 324 PID 5592 set thread context of 5888 5592 RtlUmd.exe 330 PID 5608 set thread context of 5896 5608 RtlUmd.exe 331 PID 6044 set thread context of 5156 6044 RtlUmd.exe 345 PID 6116 set thread context of 5264 6116 RtlUmd.exe 352 PID 5204 set thread context of 4444 5204 RtlUmd.exe 360 PID 5308 set thread context of 5580 5308 RtlUmd.exe 368 PID 5476 set thread context of 5788 5476 RtlUmd.exe 379 PID 5672 set thread context of 5992 5672 RtlUmd.exe 388 PID 5336 set thread context of 5612 5336 RtlUmd.exe 394 PID 5940 set thread context of 4396 5940 RtlUmd.exe 399 PID 5492 set thread context of 4996 5492 RtlUmd.exe 401 PID 5480 set thread context of 5164 5480 RtlUmd.exe 423 PID 5848 set thread context of 5520 5848 RtlUmd.exe 435 PID 5908 set thread context of 5776 5908 RtlUmd.exe 436 PID 6064 set thread context of 5336 6064 RtlUmd.exe 442 PID 5992 set thread context of 4704 5992 RtlUmd.exe 451 PID 4944 set thread context of 5448 4944 RtlUmd.exe 456 PID 4452 set thread context of 1452 4452 RtlUmd.exe 474 PID 4240 set thread context of 4944 4240 RtlUmd.exe 485 PID 6172 set thread context of 6288 6172 RtlUmd.exe 503 PID 6252 set thread context of 6392 6252 RtlUmd.exe 507 PID 6328 set thread context of 6488 6328 RtlUmd.exe 513 PID 6672 set thread context of 6812 6672 RtlUmd.exe 534 PID 6752 set thread context of 6928 6752 RtlUmd.exe 538 PID 6784 set thread context of 6940 6784 RtlUmd.exe 539 PID 6860 set thread context of 7076 6860 RtlUmd.exe 545 PID 7128 set thread context of 4704 7128 RtlUmd.exe 561 PID 5908 set thread context of 6172 5908 RtlUmd.exe 569 PID 5720 set thread context of 6740 5720 RtlUmd.exe 576 PID 6504 set thread context of 6872 6504 RtlUmd.exe 584 PID 6708 set thread context of 6828 6708 RtlUmd.exe 586 PID 6768 set thread context of 6572 6768 RtlUmd.exe 608 PID 2012 set thread context of 3996 2012 RtlUmd.exe 617 PID 6968 set thread context of 6992 6968 RtlUmd.exe 618 PID 4180 set thread context of 2892 4180 RtlUmd.exe 629 PID 6660 set thread context of 1764 6660 RtlUmd.exe 641 PID 6928 set thread context of 6828 6928 RtlUmd.exe 643 PID 6792 set thread context of 6552 6792 RtlUmd.exe 656 -
resource yara_rule behavioral2/memory/2140-1-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/2140-3-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/2140-5-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/2140-4-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/1524-12-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/2140-16-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/752-20-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/752-21-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/752-22-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/752-30-0x0000000000C80000-0x0000000000C96000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 400 2136 WerFault.exe 228 1424 2760 WerFault.exe 414 5896 5372 WerFault.exe 481 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtlUmd.exe -
Modifies registry class 51 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtlUmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 832 RtlUmd.exe 832 RtlUmd.exe 1812 RtlUmd.exe 1812 RtlUmd.exe 3012 RtlUmd.exe 3012 RtlUmd.exe 3352 RtlUmd.exe 3352 RtlUmd.exe 1064 RtlUmd.exe 1064 RtlUmd.exe 2552 RtlUmd.exe 2552 RtlUmd.exe 3212 RtlUmd.exe 3212 RtlUmd.exe 1472 RtlUmd.exe 1472 RtlUmd.exe 3640 RtlUmd.exe 3640 RtlUmd.exe 3428 RtlUmd.exe 3428 RtlUmd.exe 1892 RtlUmd.exe 1892 RtlUmd.exe 5096 RtlUmd.exe 5096 RtlUmd.exe 432 RtlUmd.exe 432 RtlUmd.exe 516 RtlUmd.exe 516 RtlUmd.exe 3544 RtlUmd.exe 3544 RtlUmd.exe 2452 RtlUmd.exe 2452 RtlUmd.exe 2136 RtlUmd.exe 2136 RtlUmd.exe 1472 RtlUmd.exe 1472 RtlUmd.exe 1112 RtlUmd.exe 1112 RtlUmd.exe 2228 RtlUmd.exe 2228 RtlUmd.exe 3976 RtlUmd.exe 3976 RtlUmd.exe 2832 RtlUmd.exe 2832 RtlUmd.exe 1288 RtlUmd.exe 1288 RtlUmd.exe 5192 RtlUmd.exe 5192 RtlUmd.exe 5320 RtlUmd.exe 5320 RtlUmd.exe 5468 RtlUmd.exe 5468 RtlUmd.exe 5592 RtlUmd.exe 5592 RtlUmd.exe 5608 RtlUmd.exe 5608 RtlUmd.exe 6044 RtlUmd.exe 6044 RtlUmd.exe 6116 RtlUmd.exe 6116 RtlUmd.exe 5204 RtlUmd.exe 5204 RtlUmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2412 wrote to memory of 2140 2412 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 89 PID 2140 wrote to memory of 1524 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 93 PID 2140 wrote to memory of 1524 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 93 PID 2140 wrote to memory of 1524 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 93 PID 2140 wrote to memory of 1524 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 93 PID 2140 wrote to memory of 4224 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 94 PID 2140 wrote to memory of 4224 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 94 PID 2140 wrote to memory of 4224 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 94 PID 2140 wrote to memory of 924 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 95 PID 2140 wrote to memory of 924 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 95 PID 2140 wrote to memory of 924 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 95 PID 2140 wrote to memory of 1248 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 96 PID 2140 wrote to memory of 1248 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 96 PID 2140 wrote to memory of 1248 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 96 PID 2140 wrote to memory of 4556 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 97 PID 2140 wrote to memory of 4556 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 97 PID 2140 wrote to memory of 4556 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 97 PID 2140 wrote to memory of 2744 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 100 PID 2140 wrote to memory of 2744 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 100 PID 2140 wrote to memory of 2744 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 100 PID 2140 wrote to memory of 1948 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 101 PID 2140 wrote to memory of 1948 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 101 PID 2140 wrote to memory of 1948 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 101 PID 2140 wrote to memory of 1964 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 102 PID 2140 wrote to memory of 1964 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 102 PID 2140 wrote to memory of 1964 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 102 PID 2140 wrote to memory of 4848 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 103 PID 2140 wrote to memory of 4848 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 103 PID 2140 wrote to memory of 832 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 104 PID 2140 wrote to memory of 832 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 104 PID 2140 wrote to memory of 832 2140 60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe 104 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 832 wrote to memory of 752 832 RtlUmd.exe 107 PID 752 wrote to memory of 3712 752 RtlUmd.exe 110 PID 752 wrote to memory of 3712 752 RtlUmd.exe 110 PID 752 wrote to memory of 3712 752 RtlUmd.exe 110 PID 752 wrote to memory of 2344 752 RtlUmd.exe 111 PID 752 wrote to memory of 2344 752 RtlUmd.exe 111 PID 752 wrote to memory of 2344 752 RtlUmd.exe 111 PID 752 wrote to memory of 4572 752 RtlUmd.exe 112 PID 752 wrote to memory of 4572 752 RtlUmd.exe 112 PID 752 wrote to memory of 4572 752 RtlUmd.exe 112 PID 1524 wrote to memory of 1812 1524 svchost.exe 113 PID 1524 wrote to memory of 1812 1524 svchost.exe 113 PID 1524 wrote to memory of 1812 1524 svchost.exe 113 PID 752 wrote to memory of 4824 752 RtlUmd.exe 114 PID 752 wrote to memory of 4824 752 RtlUmd.exe 114 PID 752 wrote to memory of 4824 752 RtlUmd.exe 114 PID 752 wrote to memory of 3392 752 RtlUmd.exe 115 PID 752 wrote to memory of 3392 752 RtlUmd.exe 115 PID 752 wrote to memory of 3392 752 RtlUmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\60a86330789a0643714d2c4ef9c7be5c_JaffaCakes118.exe2⤵
- Adds policy Run key to start application
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3600
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1064 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1736
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3640 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2224
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:516 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵
- Executes dropped EXE
PID:3976
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3352 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:532
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3212 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4276
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5096 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3532
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 30411⤵
- Program crash
PID:400
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3644
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3428 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3108
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3668
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1160
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3544 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1300
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1216
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5192 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:5372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5920
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"12⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:6044 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe13⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5168
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"14⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5672 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe15⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:5992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:3444
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"16⤵
- Identifies Wine through registry keys
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 26017⤵
- Program crash
PID:1424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:432 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1892
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:432
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5532
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5592 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5280
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"12⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:5308 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe13⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:5580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:4668
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4040
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3976 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5256
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5320 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
PID:5516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5808
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1112 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3284
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5392
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5468 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:5708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3720
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5204 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6036
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5492 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4272
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"12⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:5908 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe13⤵PID:5776
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5608 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Executes dropped EXE
PID:5896
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:6116 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:5264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5692
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:5336 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Adds Run key to start application
PID:5612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3732
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5476 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5464
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5940 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5224
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:5848 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
PID:5520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5620
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5480 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:5164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2340
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Suspicious use of SetThreadContext
PID:5992 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5308
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:5372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5372 -s 3049⤵
- Program crash
PID:5896
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:6064 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4820
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6208
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:6252 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:6392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6712
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:6752 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:7028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:7068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:7100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3168
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"12⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:5720 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe13⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:6740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:7008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6348
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"14⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe15⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:6788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:6324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:4944 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
PID:5448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5328
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4240 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6300
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:6328 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6832
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Suspicious use of SetThreadContext
PID:6860 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Modifies registry class
PID:7076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6528
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6708 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Modifies registry class
PID:6828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6996
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"12⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:6928 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe13⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:7204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:7368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:7512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:7544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:7652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:7680
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"14⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:7808 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe15⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
PID:7940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:8088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:8132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:8176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:6812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:7260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6172 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Modifies registry class
PID:6288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6616
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6672 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Adds policy Run key to start application
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5904
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5908 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1844
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6968 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:7136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:6564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:7108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1572
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"12⤵
- Identifies Wine through registry keys
PID:7232 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe13⤵PID:7644
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6784 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵PID:6940
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:7128 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Modifies registry class
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6912
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6768 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6740
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵PID:4880
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:7476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:7976
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"10⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:8064 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe11⤵PID:3996
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:6504 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:6872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6320
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6660 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
PID:1764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7172
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4180
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"6⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:7212 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:7632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:8112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:8140
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"8⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:7200
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6792 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:6552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7672
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- Identifies Wine through registry keys
PID:7556 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:7844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:8120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:8148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:8188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:7160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:6648
-
-
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8048 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe5⤵PID:5936
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4848
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3408
-
-
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exeC:\Users\Admin\AppData\Roaming\Netwrk\RtlUmd.exe6⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:1500
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2136 -ip 21361⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2760 -ip 27601⤵PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5372 -ip 53721⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD526e43d95a3ed8dba7b730cf9c306ce7a
SHA1eaaffc5b3c15b405de1963563f2b22e4e2927815
SHA256be398b92af4d02c33c8a89d935b49a067fd420af5f5e632ecaa2b4576b6908df
SHA512bcff7497d4e4061a53db2c7c0ef7b30134d7d85c5a09d3ec5363a21f4eb6174bb17ae38a2f1a970bd8facd976087def42c82a4c707f65688a523b3e6d9de9986
-
Filesize
184KB
MD560a86330789a0643714d2c4ef9c7be5c
SHA16cf5eb75e9bb75c2f42bcb301f42f444c5fd595f
SHA256423bbaf907eb2af786f3765585e8b09f9a8a6931191361ec1e25a7e8ed173fb4
SHA512e9d36ad02b0fb7adfa42d78aedb1d899ddeaf0a27fd688b00572e0acc158ead5e71f91fe954c7aa25ded65dc77640ff5b7af28b2e607284dd7ba50f4389c4ee3